• Title/Summary/Keyword: Security and Privacy

Search Result 1,473, Processing Time 0.024 seconds

A Study on the Research Trends for Smart City using Topic Modeling (토픽 모델링을 활용한 스마트시티 연구동향 분석)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.119-128
    • /
    • 2019
  • This study aims to analyze the research trends on Smart City and to present implications to policy maker, industry professional, and researcher. Cities around globe have undergone the rapid progress in urbanization and the consequent dramatic increase in urban dwellings over the past few decades, and faced many urban problems in such areas as transportation, environment and housing. Cities around the globe are in a hurry to introduce Smart City to pursue a common goal of solving these urban problems and improving the quality of their lives. However, various conceptual approaches to smart city are causing uncertainty in setting policy goals and establishing direction for implementation. The study collected 11,527 papers titled "Smart City(cities)" from the Scopus DB and Springer DB, and then analyze research status, topic, trends based on abstracts and publication date(year) information using the LDA based Topic Modeling approaches. Research topics are classified into three categories(Services, Technologies, and User Perspective) and eight regarding topics. Out of eight topics, citizen-driven innovation is the most frequently referred. Additional topic network analysis reveals that data and privacy/security are the most prevailing topics affecting others. This study is expected to helps understand the trends of Smart City researches and predict the future researches.

Counting and Localizing Occupants using IR-UWB Radar and Machine Learning

  • Ji, Geonwoo;Lee, Changwon;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • Localization systems can be used with various circumstances like measuring population movement and rescue technology, even in security technology (like infiltration detection system). Vision sensors such as camera often used for localization is susceptible with light and temperature, and can cause invasion of privacy. In this paper, we used ultra-wideband radar technology (which is not limited by aforementioned problems) and machine learning techniques to measure the number and location of occupants in other indoor spaces behind the wall. We used four different algorithms and compared their results, including extremely randomized tree for four different situations; detect the number of occupants in a classroom, split the classroom into 28 locations and check the position of occupant, select one out of the 28 locations, divide it into 16 fine-grained locations, and check the position of occupant, and checking the positions of two occupants (existing in different locations). Overall, four algorithms showed good results and we verified that detecting the number and location of occupants are possible with high accuracy using machine learning. Also we have considered the possibility of service expansion using the oneM2M standard platform and expect to develop more service and products if this technology is used in various fields.

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

A Comparative Assessment Between ACSS of Canada and FedACH of America as a Electronic Payment System (전자결제시스템으로서 캐나다의 ACSS와 미국의 FedACH의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.18 no.1
    • /
    • pp.55-78
    • /
    • 2016
  • This paper discusses on Electronic Payment System between U.S.A. and Canada. In particular, I focused on ACSS compare with FedACH(Fed Automated Clearing House) to advance a research effects. Because both of them is a low-value, high-volume retail payment system which their countries represent. The ACSS(Automated Clearing Settlement System) is the system through which the vast majority of CPA payment items are cleared, through various payment streams. In 2014, ACSS system cleared approximately 6.8billion payments worth a total value of $ 44.9 trillion. While, The FedACH Network are the center of America Commerce, moving more than $40 trillion each year. That's made up of almost 23 billion electronic financial transaction, including direct deposit via ACH, social security and government benefits, electronic bill payments such as utility and mortgage payments. Thus in this article, first of all, I considered features of payment system and the types of payment items between ACSS and FedAch. Second, I analyzed the status of central bank and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that their payment and banking system have to assume, with good reason, more efficiently accurately and securely operation to protect their customer from credit risk and financial fraud.

  • PDF

The Effect of Service Quality and Company Reputation on Customer Satisfaction and Loyalty in Mobile Payment: Moderating Effects of Switching Barriers (모바일 간편 결제 서비스 품질 및 기업 명성이 고객 만족과 충성도에 미치는 영향: 전환장벽의 조절적 작용)

  • Kim, Eun Bi;Yang, Hongsuk
    • Journal of Service Research and Studies
    • /
    • v.7 no.2
    • /
    • pp.17-41
    • /
    • 2017
  • The purpose of this research is to investigate the factors that impact customer satisfaction and loyalty in mobile payment services. Specifically, this research (1) studies the influence of company reputation on customer satisfaction and loyalty, (2) examines service quality dimensions that increase customer satisfaction, and (3) assesses switching barriers as moderators in influencing customer loyalty. Findings of this empirical research reconfirm the point of view that company reputation, service quality, and switching barriers are crucial for customer satisfaction in mobile payment services. The research methodologies that were used to verify the hypothesis in this study included customized surveys and structural equation modeling. The results demonstrated that company reputation significantly affects customer satisfaction and loyalty. Additionally, the results indicated that only two of the five total service qualities, ease of use and the security/privacy qualities, have positive influences on customer satisfaction. Customer satisfaction has also proven to be a significant influence on loyalty. Lastly, the results showed that among the factors of switching barriers, the factors of lost performance costs, sunk costs, setup costs, the attractiveness of alternatives, and service recovery have moderating effects on the relationships between customer satisfaction and loyalty. Base on the results, this research recommends that firms aim at devising integrated strategies that make switching barriers act as complements to customer satisfaction.

Reversible Data Hiding and Message Authentication for Medical Images (의료영상을 위한 복원 가능한 정보 은닉 및 메시지 인증)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Jo, Min-Ho;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.65-72
    • /
    • 2010
  • Nowadays, most hospitals have been used to create MRI or CT and managed them. Doctors depend on fast access to images such as magnetic resonance imaging (MRIs), computerized tomography (CT) scans, and X-rays for accurate diagnoses. Those image data are related privacy of a patient. Therefore, it should be protected from hackers and managed perfectly. In this paper, we propose a data hiding method into MRI or CT related a condition and intervention of a patient, and it is suggested that how to authenticate patient information from an image. In this way, we create hash code using HMAC with patient information, and hash code and patient information is hided into an image. After then, doctor will check authentication using HMAC. In addition, we use a reversible data hiding DE(Difference Expansion) algorithm to hide patient information. This technique is possible to reconstruct the original image with stego image. Therefore, doctor can easily be possible to check condition of a patient. As a consequence of an experiment with MRI image, data hiding, extraction and reconstruct is shown compact performance.

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

A Study on the Factors Affecting User Behavior of Internet Medical Apps (인터넷 의료 애플리케이션 사용 행위에 영향을 미치는 요소에 관한 연구)

  • Han, Xiao;Lee, Hong;Kim, Hyeong-woo
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.81-90
    • /
    • 2020
  • Due to the recent economic development and the improvement of income level in China, the desire for quality medical services is increasing compared to the past. As an alternative to satisfy these needs, various applications using smart phones and the like are being developed. The new corona that occurred in December 2019 began to show great interest in non-face-to-face telemedicine services using smart phones due to the worldwide spread of the coronavirus. Therefore, in this study, a total of 200 people were surveyed on the top three mobile medical applications in China, and the data of 120 people who actually used medical applications were analyzed based on Venkatesh's UTAUT2 theory. A study was conducted on the intent to use and the factors affecting the in-law behavior. First, it has become clear that the interactive characteristics, expectations for effort, price value, interest in privacy, habits, and promotional conditions have a positive impact on the user's use. Second, it was investigated that the user's intention to use influences the behavior of use, and among the intentions of use, it was found that the mobilization characteristic expectation, hedonistic motivation, price value, habits, and promotion conditions affect the use behavior. Third, a study result was derived that the controlling variables such as gender, age, school age, and annual income do not affect the user's intention to use mobile medical applications as a controlling variable. Finally, due to the nature of mobile devices that use the Internet, various security vulnerabilities exist, and this can cause great damage or personal and social impact. Therefore, for the development of mobile medical services in China, it is necessary to re-establish a research model through comprehensive and in-depth considerations to supplement these problems in the future.

Design of FMCW Radar Signal Processor for Human and Objects Classification Based on Respiration Measurement (호흡 기반 사람과 사물 구분 가능한 FMCW 레이다 신호처리 프로세서의 설계)

  • Lee, Yungu;Yun, Hyeongseok;Kim, Suyeon;Heo, Seongwook;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.305-312
    • /
    • 2021
  • Even though various types of sensors are being used for security applications, radar sensors are being suggested as an alternative due to the privacy issues. Among those radar sensors, PD radar has high-complexity receiver, but, FMCW radar requires fewer resources. However, FMCW has disadvantage from the use of 2D-FFT which increases the complexity, and it is difficult to distinguish people from objects those are stationary. In this paper, we present the design and the implementation results of the radar signal processor (RSP) that can distinguish between people and object by respiration measurement using phase estimation without 2D-FFT. The proposed RSP is designed with Verilog-HDL and is implemented on FPGA device. It was confirmed that the proposed RSP includes 6,425 LUT, 4,243 register, and 12,288 memory bits with 92.1% accuracy for target's breathing status.

A Study on the Use and Risk of Artificial Intelligence (Focusing on the eproperty appraiser industry) (인공지능의 활용과 위험성에 관한 연구 (감정 평가 산업 중심으로))

  • Hong, Seok-Do;You, Yen-Yoo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.81-88
    • /
    • 2022
  • This study is to investigate the perception of domestic appraisers about the possibility of using artificial intelligence (AI) and related risks from the use of AI in the appraisal industry. We conducted a mobile survey of evaluators from February 10 to 18, 2022. We collected survey data from 193 respondents. Frequency analysis and multiple response analysis were performed for basic analysis. When AI is used in the appraisal industry, factor analysis was used to analyze various types of risks. Although appraisers have a positive perception of AI introduction in the appraisal industry, they considered collateral, consulting, and taxation, mainly in areas where AI is likely to be used and replaced, mainly negative effects related to job losses and job replacement. They were more aware of the alternative risks caused by AI in the field of human labor. I was very aware of responsibilities, privacy and security, and the risk of technical errors. However, fairness, transparency, and reliability risks were generally perceived as low risk issues. Existing studies have mainly studied analysis methods that apply AI to mass evaluation models, but this study focused on the use and risk of AI. Understanding industry experts' perceptions of AI utilization will help minimize potential risks when AI is introduced on a large scale.