• Title/Summary/Keyword: Unauthorized Sharing

Search Result 23, Processing Time 0.016 seconds

An Implementation of Database Security Using Steganography in the Web (웹 상에서 스테가노그라피 기법을 이용한 안전한 데이터베이스 보안 구현)

  • Moon, Bong-Keun;Ryoo, Du-Gyu;Ko, Myung-Sun;Eom, Ki-Won;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.3-11
    • /
    • 2005
  • As the usage of Internet grows, we share many informations among the others and use more database systems for a various type of data. However, secure database system, which prevents the unauthorized users from modification, deletion, and access, is urgently required for sharing data in Internet. Conventional technologies of a data security are passive methods which depend on several steps with an access control, and these methods are vulnerable against the illegal attack because attacker can see the plain text that is private message. To prevent private data item for the special security from the malicious attack in web database, this paper is devoted to implement database system using steganography method, so we can protect the data item completely because attacker cannot know the secure message although he get the content of database.

An Analysis of Usage of Sci-Hub in Korea (국내 Sci-Hub 이용 현황 분석)

  • Jeeyoung, Suh
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.473-490
    • /
    • 2022
  • This study was conducted to examine Sci-Hub, which provides the original text of academic papers to be provided for a fee by bypassing copyright, and to establish a basic basis for understanding the usage behavior of researchers with access restriction in Korea by analyzing the domestic Sci-Hub usage based on the dataset released by Sci-Hub in 2017. Therefore, after grasping the current status of the world related to Sci-Hub, the categories were set and analyzed by region where the dataset was downloaded, subject matter of academic papers, publisher, OA status, and published year. As a result of the study, the most downloaded areas were Seoul and the metropolitan area, and papers and journals in the field of natural science were downloaded the most, and about 20% of papers were in Open Access state. The papers published between 2010 and 2017 were the most downloaded, and IEEE's papers were the most downloaded, showing that recently published academic papers in the natural sciences were the most downloaded by the time they were downloaded.

A Study on the Possibility of Self-Correction in the Market for Protecting Internet Privacy (인터넷 개인정보보호의 시장자체해결가능성에 대한 연구)

  • Chung, Sukkyun
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.27-37
    • /
    • 2012
  • Internet privacy has become a significant issue in recent years in light of the sharp increase in internet-based social and economic activities. The technology which collects, processes and disseminates personal information is improving significantly and the demand for personal information is rising given its inherent value in regard to targeted marketing and customized services. The high value placed on personal information has turned it into a commodity with economic worth which can be transacted in the marketplace. Therefore, it is strongly required to approach the issue of privacy from economic perspective in addition to the prevailing approaches. This article analyzes the behaviors of consumers and firms in gathering personal information, and shielding it from unauthorized access, using a game theory framework in which players strive to do their best under the given conditions. The analysis shows that there exist no market forces which require all firms to respect consumer privacy, and that government intervention in the form of a nudging incentive for information sharing and/or strict regulation is necessary.