• Title/Summary/Keyword: Private Information Protection

Search Result 257, Processing Time 0.026 seconds

Offline Object Tracking for Private Information Masking in CCTV Data (CCTV 개인영상 정보보호를 위한 오프라인 객체추적)

  • Lee, Suk-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2961-2967
    • /
    • 2014
  • Nowadays, a private protection act has come into effect which demands for the protection of personal image information obtained by the CCTV. According to this act, the object out of interest has to be mosaicked such that it can not be identified before the image is sent to the investigation office. Meanwhile, the demand for digital videos obtained by CCTV is also increasing for digital forensic. Therefore, due to the two conflicting demands, the demand for a solution which can automatically mask an object in the CCTV video is increasing and related IT industry is expected to grow. The core technology in developing a target masking solution is the object tracking technique. In this paper, we propose an object tracking technique which suits for the application of CCTV video object masking as a postprocess. The proposed method simultaneously uses the motion and the color information to produce a stable tracking result. Furthermore, the proposed method is based on the centroid shifting method, which is a fast color based tracking method, and thus the overall tracking becomes fast.

Private security development plan through security guard crime statistics analysis

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.283-288
    • /
    • 2021
  • The purpose of this paper is to provide basic data for related studies by comparing and analyzing crimes committed by security guards through criminal statistical analysis, and to contribute to the sound development of the private security industry by strengthening the professional ethics of security guards and reducing guard crimes. The purpose. As a results of a comparative analysis of the number of crimes by security guards and the crime rate are as follows. Although the total number of crimes committed in Korea and the number of crimes committed by security guards decreased every year, the crime rate of security guards was higher than the average crime rate. felonious crimes, violent crimes, customs crimes, and special economic crimes were consistently high. As a countermeasure against the results, first, interest in security guard crimes as perpetrators rather than as victims, second, reinforcement of professional ethics education through new training and job training, third, academic development and systematic It appeared as a specification of the definition and current status of security guards for the study.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

Proposed measure for Smart Grid's Personal Information Security Issue (스마트 그리드 개인정보 보안이슈 방안 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.

A study on the information protection to prepare for the change of EC environment (EC 환경변화에 대응하기 위한 정보보호에 관한 연구)

  • 신영균
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1691-1696
    • /
    • 2002
  • The major factors for the information protection to prepare for the change of the EC environment are found to be the construction of internet cyber-mall, the consumer-protecting regulations and the private information and system security regulations. The standards and methods of the their judgement is also important factors and are believed to attract the consumers' interest about the assessment of the internet cyber-mall and eventually serve the rights and interests of the consumers. The technology-level for the business transaction, the research and development of its technology and putting it into practical use are also found to be significant factors.

  • PDF

A Study on Private Health Insurance in Korea (민간의료보험의 현황 및 활성화에 관한 연구)

  • 정기택
    • Health Policy and Management
    • /
    • v.7 no.2
    • /
    • pp.109-146
    • /
    • 1997
  • This study explores the feasibility of activating private health insurance in Korea. The rationale for expanding private supplementary health insurance can be found in many cases of health care reforms in the European countries. Private health insurance can not only relieve the financial distress of the government health insurance programs but also offer the medical institutions incentives to improve the quality of medical care. In Korea there is no supplementary health insurance that reimburses for various kinds of diseases based on a well designed fee schedule. Recently, the cancer insurance is the best seller in the health related insurance market. As observed in the U. S. case, the cancer insurance which pays the predetermined amount (indemnity coverage) regardless of the medical charges incurred to the patient is limited in its coverage for the insured. To provide better protection against catastrophic diseases, the government should give insurance companies incentives to develop health insurance products that cover multiple diseases rather than a single disease. Consumers can hardly understand and compare complex insurance products. To resolve the information asymmetries, the government should publish a consumer report that compare various health insurance products in a user friendly way. In the long run, insurance companies will plan to sell health insurance products that charge risk related premium only when insurers accumulate the underwriting know-hows, the government shares data on various health statistics including claims and demographics, and risk pool for high risk patients is well established and subsidized by the government.

  • PDF

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.

Conflict Process and Policy Implications of NEIS Case using Frame Analysis (프레임 분석을 통한 NEIS 갈등과정 분석과 정책적 함의)

  • Seo, Hyungjun;Myeong, Senghwan
    • Informatization Policy
    • /
    • v.21 no.3
    • /
    • pp.56-84
    • /
    • 2014
  • ICT development has led the government to provide more personalized services which means that the government has to collect more private information to satisfy the information demand from citizen. It is a dilemma because the more tailored information services may arise conflict against the right of private information protection which is one of the side effect by ICT. In this study, we analyzed the case of NEIS which still represents the issue of privacy conflict among each stakeholder's perspectives. To analyze the case, we used the frame analysis which is used as a tool for analyzing the case of public conflict. Through the analyses and discussions, we found the policy implication for the future ICT policies which can mediate the conflict between a data opening and the protection of privacy. Finally, we suggest a new governance approach for the better ICT policy contrary to top-down approach.

A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent

  • Jung, Chang-Ryul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.371-378
    • /
    • 2004
  • As an agent is applied into various fields, it is suggested as the paradigm of new application technology in the area of computer communication. However, the mobile agent brines the problem of security on an agent due to mobility. This study proposals the mobile agent protection protocol framework for more effective protection and safety. The designed Framework of protocol uses the public ky, the private key and the digital signature in PKI environment based on JAVA. This is the mechanism accomplishing safely the work of an agent by tracking the pattern of execution and the mobility plan through the VS(verification server). This also secures the suity and the flawlessness of an agent through the VS guaranteeing safety from malicious attacks.