• Title/Summary/Keyword: Security and privacy concerns

Search Result 104, Processing Time 0.02 seconds

A Study on the Design Characteristic and Improvement of the Studio Type Urban Lifestyle Housing in Seoul (서울시 도시형 생활주택 원룸형 주거의 계획특성 및 개선방안 연구)

  • Cho, Min-Jung
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.2
    • /
    • pp.156-166
    • /
    • 2011
  • A studio type urban lifestyle housing was recently introduced as a new urban multi-housing typology. It was particularly created to meet the increasing housing demand of one-person households due to the population change and the shortage of housing supply. However, some concerns have been raised, because the government's policy has been focused on expanding housing supply by easing certain legal regulations in construction. Poorly planned and managed urban lifestyle housings might degrade living conditions for one-person households and ultimately harm urban environments. As such, this research is conducted to investigate the design characteristics of the studio type urban lifestyle housing from selected construction precedents in Seoul. Critical evaluations are made for the facilities and uses in site plans, unit plans, and shared public spaces. As a result, problem areas are found in the lack of design varieties, privacy protection in units, control of natural environment conditions, and the absence of community spaces. Improvement strategies can be suggested by comparing with some overseas' housing precedents: Design variations can be extended through flexible structure, facility, and furniture systems. Privacy and natural environment can be controled through the integration of interior space configurations and exterior envelope systems. The housing policy needs to be reconsidered to improve a variety in design, residents' social interaction, security, and management. Thereby, the studio type urban lifestyle housing should be holistically approached in terms of design and policy to enrich urban living experiences by residents and communities.

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.

Risk Perceptions and Risk-reduction Strategies in Internet Apparel Shopping

  • Lee, Mi-Young
    • Journal of Fashion Business
    • /
    • v.9 no.3
    • /
    • pp.134-149
    • /
    • 2005
  • Although Internet retailing is becoming a viable channel for apparel retailing, consumers are still reluctant to use Internet for apparel purchasing because at their concerns at Internet security and the difficulties at virtual shopping in unfamiliar shopping environment. The purpose at this study is to examine the nature at perceived risk associated with Internet apparel shopping and risk-reduction strategies used by Internet apparel shoppers. The data were collected via an online survey by a online research company. A total at 4,254 Internet users participated in this survey. Among these Internet users, 1,146 respondents had previous shopping experience in Internet shopping. Within this group, 195 were Internet apparel information seekers, and 589 were Internet apparel purchasers. Descriptive statistics, analysis of variance, and t-test were used to analyze the data. The perceived risks and risk-reduction strategies used by Internet apparel no-interest shoppers, Internet apparel information seekers (browsers), moderate Internet apparel purchasers, heavy Internet apparel purchasers were examined and compared. The results indicated that these tour groups were significantly different in apparel related risk, performance risk, and privacy risk. Internet purchasers tend to perceive more apparel-related, performance, and privacy risks than others. The results also indicated that these tour groups were significantly different in their opinions of risk-reduction strategies.

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

A Method of Generating Changeable Face Template for Statistical Appearance-Based Face Recognition (통계적 형상 기반의 얼굴인식을 위한 가변얼굴템플릿 생성방법)

  • Lee, Chul-Han;Jung, Min-Yi;Kim, Jong-Sun;Choi, Jeung-Yoon;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.2 s.314
    • /
    • pp.27-36
    • /
    • 2007
  • Changeable biometrics identify a person using transformed biometric data instead of original biometric data in order to enhance privacy and security in biometrics when biometric data is compromised. In this paper, a novel scheme which generates changeable face templates for statistical appearance-based face recognition is proposed. Two different original face feature vectors are extracted from two different appearance-based approaches, respectively, each original feature vector is normalized, and its elements are re-ordered. Finally a changeable face template is generated by weighted addition between two normalized and scrambled feature vectors. Since the two feature vectors are combined into one by a two to one mapping, the original two feature vectors are not easily recovered from the changeable face template even if the combining rule is known. Also, when we need to make new changeable face template for a person, we change the re-ordering rule for the person and make a new feature vector for the person. Therefore, the security and privacy in biometric system can be enhanced by using the proposed changeable face templates. In our experiments, we analyze the proposed method with respect to performance and security using an AR-face database.

Systematic Literature Review of Smart Trade Contract Research (스마트 무역계약 연구의 체계적 문헌고찰)

  • Ho-Hyung Lee
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.243-262
    • /
    • 2023
  • This study provides a systematic review of smart trade contracts, examining the research trends and theoretical background of utilizing smart contracts and blockchain technology for the digitalization and automation of trade contracts. Smart trade contracts are a concept that applies the automated contract system based on blockchain to trade-related transactions. The study analyzes the technical and legal challenges and proposes solutions. The technical aspect covers the development of smart contract platforms, scalability and performance improvements of blockchain networks, and security and privacy concerns. The legal aspect addresses the legal enforceability of smart contracts, automatic execution of contract conditions, and the responsibilities and obligations of contract parties. Smart trade contracts have been found to have applications in various industries such as international trade, supply chain management, finance, insurance, and energy, contributing to the ease of trade finance, efficiency of supply chains, and business model innovation. However, challenges remain in terms of legal regulations, interaction with existing legal frameworks, and technological aspects. Further research is needed, including empirical studies, business model innovation, resolution of legal issues, security and privacy considerations, standardization and collaboration, and user experience studies to address these challenges and explore additional aspects of smart trade contracts.

Optimization of Data Placement using Principal Component Analysis based Pareto-optimal method for Multi-Cloud Storage Environment

  • Latha, V.L. Padma;Reddy, N. Sudhakar;Babu, A. Suresh
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.248-256
    • /
    • 2021
  • Now that we're in the big data era, data has taken on a new significance as the storage capacity has exploded from trillion bytes to petabytes at breakneck pace. As the use of cloud computing expands and becomes more commonly accepted, several businesses and institutions are opting to store their requests and data there. Cloud storage's concept of a nearly infinite storage resource pool makes data storage and access scalable and readily available. The majority of them, on the other hand, favour a single cloud because of the simplicity and inexpensive storage costs it offers in the near run. Cloud-based data storage, on the other hand, has concerns such as vendor lock-in, privacy leakage and unavailability. With geographically dispersed cloud storage providers, multicloud storage can alleviate these dangers. One of the key challenges in this storage system is to arrange user data in a cost-effective and high-availability manner. A multicloud storage architecture is given in this study. Next, a multi-objective optimization problem is defined to minimise total costs and maximise data availability at the same time, which can be solved using a technique based on the non-dominated sorting genetic algorithm II (NSGA-II) and obtain a set of non-dominated solutions known as the Pareto-optimal set.. When consumers can't pick from the Pareto-optimal set directly, a method based on Principal Component Analysis (PCA) is presented to find the best answer. To sum it all up, thorough tests based on a variety of real-world cloud storage scenarios have proven that the proposed method performs as expected.

RFID Technology in Health Environment Opportunities and Challenges for Modern Cancer Care

  • Safdari, Reza;Maserat, Elham;Maserat, Elnaz
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.12
    • /
    • pp.6533-6537
    • /
    • 2012
  • Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare

  • Kim, Eun-Jin;Lee, Byeong-Tae
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.141-146
    • /
    • 2007
  • The importance of the net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of a well-implemented the net-based customer service are enhanced customer loyalty and higher lock-in of customers, and the resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such the net-based customer service. This is partly due to the e-commerce divide, and partly due to privacy and security concerns of the customer for sharing personal information with firms. The limited level of customer adoption of the net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We find that an increase in adoption of the net-based customer service by the customer base is not always desirable for firms. and that customers who utilize such services are better off only when the overall adoption is limited.

  • PDF