• Title/Summary/Keyword: digital privacy

Search Result 370, Processing Time 0.027 seconds

A Consumer Perception based on the Type of Recommender System : A Privacy Calculus Perspective (상품 추천 서비스 유형에 따른 소비자 반응 연구 : 프라이버시 계산 모델을 중심으로)

  • Choi, Hye-Jin;Cho, Chang-Hoan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.254-266
    • /
    • 2020
  • The purpose of this study is to analyze the influence of the type of recommender system on consumer's perceived benefit and privacy risk. The result showed that the perceived usefulness and intension to click was high in the order of Hybrid-filtering, Bestseller, and SNS-based system. Privacy concern was high in order of SNS-based system, Hybrid-filtering, and Bestseller. Moderating effects of perceived personalization on the type of recommender system and perceived usefulness were significant. Finally perceived usefulness had positive effect, and privacy concern had negative effect on consumer's intension to click. This study has significant implications for digital marketing bt comparing consumer responses according to the type of recommended service. The result of this study can be helpful for providing and developing future recommender service.

Analysis of Privacy Violation Possibility of Partially Anonymized Big Data (온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석)

  • Jung, Kang-soo;Park, Seog;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.665-679
    • /
    • 2018
  • With the development of information and communication technology, especially wireless Internet technology and the spread of smart phones, digital data has increased. As a result, privacy issues which concerns about exposure of personal sensitive information are increasing. In this paper, we analyze the privacy vulnerability of online big data in domestic internet environment, especially focusing on portal service, and propose a measure to evaluate the possibility of privacy violation. For this purpose, we collected about 50 million user posts from the potal service contents and extracted the personal information. we find that potal service user can be identified by the extracted personal information even though the user id is partially anonymized. In addition, we proposed a risk measurement evaluation method that reflects the possibility of personal information linkage between service using partial anonymized ID and personal information exposure level.

A Study on Design Representation of Publicity and Privacy in Dutch Multi-family Housing - Focused on an Analysis of Eastern Dockland Projects in Amsterdam - (네덜란드 도시 집합주택의 공공성과 개별성 표현특성에 관한 연구 - 암스테르담 부두재개발 주택단지 사례를 중심으로 -)

  • Moon Eun-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.2 s.49
    • /
    • pp.112-119
    • /
    • 2005
  • This study attempts to suggest new directions of urban multi-family housing design in the recent era of information, in which the representation of publicity and privacy of the housing reflects new meanings and relationships of the current digital society. The study examines cases of Dutch multi-family housing and investigates the meanings and relationships of publicity and privacy in the building as well as unit design of the housings. Borneo-Sporenburg housing development is a good example that suggests new interpretation and design solution for low-rise, high-density multi-family housing. Thus, this study analyzes street patterns, facade design, and ways of housing unit combination in Borneo-Sporenburg housing and concludes as follows. First, public space in Borneo-Sporenburg housing, which was designed differently from hierarchical and centripetal organization of modern architecture, is divided into small units and spread into the inside, which provides high potential for personal control of space and personal programming of space by space choices. Second, street pattern and facade design of Borneo-Sporenburg housing provide visual publicity and privacy simultaneously as they maintain unity as a whole as well as articulate individual unit in many different ways and provide clues to neighboring. Streets as a public domain have self-controlled boundaries for residents and introduce voluntary use-programs for residents. Third, facades of the housing have no inter-mediate space or common space, and confront streets directly. Space in-between is composed inside the facade and extends into the streets by residents' own choices. Fourth, privacy and individuality of the housing is strengthened. Units of the housing have individual entrances, unique plan type and complicated combination of space that all together emphasize individuality of units, however they are not often notified from the outside.

Low-cost privacy protection integrated monitoring system using interest emphasis method (관심강조 방법을 활용한 저비용 사생활보호 통합관제시스템)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.234-239
    • /
    • 2021
  • Recently, as the installation of a large number of high-performance CCTVs for crime prevention and traffic control has increased rapidly, the problem of increasing system requirements for response to privacy infringement factors and analysis of high-definition image information transmitted from multiple cameras has been actively emerging. Accordingly, there is a need for a method for responding to privacy infringement and a method for efficiently processing surveillance images input from multiple cameras. In this paper, in order to reduce the processing cost of the input image and improve the processing speed, an integrated image is generated by grouping images input from a plurality of cameras. After analyzing the pre-generated integrated video, it detects a preset privacy event or an event that highlights interest. Depending on whether or not an event is detected, you will perform an editing operation corresponding to the event.

A Study of Ubiquitous Computing Security Technology (유비쿼터스 컴퓨팅 보안기술에 관한 연구)

  • Gang, Hui-Jo
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.305-313
    • /
    • 2007
  • 유비쿼터스 컴퓨팅 사회의 보안기술에 대한 적절한 정의가 필요하고 유비쿼터스 컴퓨터 환경을 신뢰하고 안전하게 사용할 수 있고 활성화하기 위한 환경을 만드는 것이 매우 중요하다. 본 논문에서는 유비쿼터스 컴퓨팅 환경 내 개인정보의 중요성 및 특징, 피해현황, 해외 개인정보 동향, 개인정보의 침해 기술 개인정보 보호 기술에 대하여 검토하고 정보보호 구현방안을 검토한다.

  • PDF

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

Right to delete and Right to be forgotten -Discuss on the condition of the right to delete (기사삭제 요구권과 잊혀질 권리 - 기사삭제의 인정기준에 관한 논의)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.13-22
    • /
    • 2014
  • The right to be forgotten is a world-wide issue after the decision of the European Court of Justice which accepted that right. This essay discusses about the guide lines for protecting the right to delete, a category of the right to be forgotten. I classified those guide lines as follows : (1) sensitiveness of the personal information, (2) offensiveness to reasonable and ordinary people, (3) intention of writing the article, (4) value of historical record, (5) importance of privacy comparing with right to know with time flow, (6) public figure, (7) article based on fact or opinion. To effectively protect right to be forgotten and delete, we have to consider Privacy Impact Assessment, using blind system, unification of multiple institutions, and reforming press arbitration system.

Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment (응급 상황에서 환자의 프라이버시를 보장하는 속성기반 접근 제어 프로토콜)

  • Jeong, Yoon-Su;Han, Kun-Hee;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.279-284
    • /
    • 2014
  • Recently, m-health care is be a problem that the patient's information is easily exposed to third parties in case of emergency situation. This paper propose an attribute-based access control protocol to minimize the exposure to patient privacy using patient information in the emergency environment. Proposed protocol, the patient's sensitive information to a third party do not expose sensitive information to the patient's personal health information, including hospital staff and patients on a random number to generate cryptographic keys to sign hash. In addition, patient information from a third party that is in order to prevent the illegal exploitation of the patient and the hospital staff to maintain synchronization between to prevent the leakage of personal health information.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.