• Title/Summary/Keyword: Private Information Protection

Search Result 257, Processing Time 0.038 seconds

A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection (아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향)

  • Kim, So-Ra;Rhee, Kee-Choon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.8
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

Utilizing animation contents for e-learning performance enhancement: focus on private information security (대구경북 서비스 콘텐츠 활성화를 위한 애니메이션 콘텐츠가 학습성과의 연관관계 연구: 개인정보보안을 중심으로)

  • Jung, Jason J.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.471-476
    • /
    • 2011
  • As information and communication technologies (ICTs) has been developed, it is getting more important for internet users to consider many security issues (e.g., privacy protection). In this paper we claims that animation contents make a positive influence on teaching such computer securities, and investigate what features of animation contents will be the most important relationships with performance of the teaching process. Once we have obtained the survey results from students, two main features (i.e., characters and plots) of the animation contents have positively influenced the performance of e-learning systems.

A Basic Contents Item for the User Interface in the Internet Shopping Mall (인터넷쇼핑몰의 사용자 인터페이스를 위한 기본 컨텐츠 항목)

  • Moon Byung-Koo
    • Journal of Internet Computing and Services
    • /
    • v.4 no.5
    • /
    • pp.31-41
    • /
    • 2003
  • At present, the market size of electronic commerce has increased and also the construction of internet shopping mall has expended. But it raises question about issue that the manpower who develope user interface lack of the comprehensive and systematic approach. For that reason this study identified the main factor of the user interface contents in internet shopping mall and suggested the contents item based on the reliability, safety and ease of uses for the customer. Eventually, the developed basic contents items are company information, the protection policy of private information, user agreement. product information, settlement information, order process, delivery process and customer support.

  • PDF

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

Insights into the state of radiation protection among a subpopulation of Indian dental practitioners

  • Binnal, Almas;Rajesh, Gururaghavendran;Denny, Ceena;Ahmed, Junaid;Nayak, Vijayendra
    • Imaging Science in Dentistry
    • /
    • v.43 no.4
    • /
    • pp.253-259
    • /
    • 2013
  • Purpose: Radiographs is an integral part of patient management in dentistry, despite their detrimental effects. As the literature pertaining to radiation protection among Indian dental practitioners is sparse, exploring such protection is needed. Materials and Methods: All private dental practitioners in Mangalore, India were included in the study. A structured, pre-tested, self-administered questionnaire was employed to assess the knowledge, attitudes, practices, previous training, perceptions towards the need to spread awareness, and willingness to gain and implement knowledge about radiation hazards and protection. Information regarding each respondent's age, gender, education, and type and duration of practice was collected. Results: Overall, 87 out of 120 practitioners participated in the study. The mean knowledge, attitude, and practice scores were $9.54{\pm}2.54$, $59.39{\pm}7.01$, and $5.80{\pm}3.19$, respectively. Overall, 25.3% of the respondents had undergone training in radiation protection, 98.9% perceived a need to spread awareness, and 94.3% were willing to improve their knowledge. Previous training showed a significant correlation with age, sex, and duration of practice; attitude was significantly correlated with education and type of practice; and knowledge scores showed a significant correlation with type of practice. Conclusion: Although the knowledge and practices of respondents were poor, they had a positive attitude and were willing to improve their knowledge. Age, sex, and duration of practice were associated with previous training; education and type of practice with attitude scores; and type of practice with knowledge scores. The findings of this study suggest a policy is needed to ensure the adherence of dental practitioners to radiation protection guidelines.

Evaluation of Safeness and Functionality in Applied Technologies for Mobile Messengers

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.29-39
    • /
    • 2016
  • Recently, KakaoTalk users seek secure messengers with fears of 'possible' censorship over a mobile messenger. Instead German messenger "Telegram" is gaining popularity in South Korea. Are the known as secure messengers actually secure? In this paper, we evaluate secure mobile messengers in terms of private information protection. We establish the fourteen criteria to evaluate the functionality of messenger apps including communication encryption in transit, the possibility of leakage of decrypted messages via server, an encryption algorithm, a key exchange algorithm, an ephemeral message application, etc. Line, Telegram, Snapchat, WhatsApp, Wickr, Facebook Messenger and KakaoTalk, which have many worldwide and domestic users, are to be targeted. Wickr is ranked at the top of the evaluation, followed by Telegram and Line but KakaoTalk and Snapchat are ranked at the bottom of the evaluation list.

Study on IT security audit system for e-commerce private information protection (코일형 자계측정기용 센서의 특성)

  • Park, Geon-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.179-180
    • /
    • 2018
  • 자계 검출 센서는 여러 가지 종류가 있으나 벽면에 흐르는 미소 자계 및 차폐 전선에서 검출이 가능한 구조는 초전도 양자 간섭 소자(SQUID)가 주로 사용되지만 가격 및 물성 재료 특성으로 인하여 특수 용도로 사용되고 있다. 이에 본 연구에서는 전선으로부터 발생되는 저주파 자장을 검출할 수 있고 휴대성 및 가격이 저렴한 구조인 코일형 자계측정기를 개발하기 위해 자기 코어 및 코일 Turn수 변화에 따른 자계 검출 감도를 조사하여 최적의 구조를 설정하였다.

  • PDF

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.