• Title/Summary/Keyword: digital privacy

Search Result 371, Processing Time 0.02 seconds

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

A Study on the Influencing Factors on the Acceptance Intention of Autonomous Vehicles Level 4-5 (자율주행자동차 4-5단계의 수용의도에 미치는 영향요인에 관한 연구)

  • Park, Min Hee;Kwon, Mahn Woo;Kim, Chee Yong;Nah, Ken
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.9
    • /
    • pp.1219-1228
    • /
    • 2020
  • In this study, the factors affecting the acceptance intention for level 4-5 of autonomous vehicles were investigated by applying TAM(Technology Acceptance Model). To this end, 332 ordinary persons interested in autonomous vehicle and experienced in driving car were analyzed by using SEM(Structural Equation Modeling). The results showed that self-efficacy and personal innovation had a positive effect on perceived usefulness. On the other hand personal innovation has been shown to have a negative effect on perceived usefulness. Perceived ease of use has a positive effect on perceived usefulness, perceived ease of use and perceived usefulness has a positive effect on acceptance intention. Safety and Privacy has been shown to have a positive effect on trust, trust has a positive effect on acceptance intention. Lastly, autonomous vehicles have a higher impact on their 20s and 30s. The result of this study is expected to be a very useful basic research for the development of target autonomous vehicles, the selection of targets, the direction of corporate marketing strategies, and the preparation of government policies.

Anonymous Pay-Per-View Service for Web-Based Video-on-Demand Systems (웹 기반 VOD 시스템을 위한 익명성이 제공되는 Pay-Per-View 서비스)

  • Joo, Han-Kyu
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.69-75
    • /
    • 2008
  • Video-on-demand (VOD) service allows subscribers to view any video whenever they want. With the development of the high speed computer networks, web-based VOD services are available. To support VOD services, charging scheme is necessary. Pay-per-view is an effective charging scheme for VOD services. Pay-per-view allows the subscribers to pay for what they have viewed. Privacy is another important attribute for VOD services. The subscribers may not want to reveal what they have viewed to anyone including the VOD provider. Anonymity makes it complicated to calculate charge for the VOD service. An approach that achieves both anonymity and pay-per-view charge calculation is necessary. In this paper, anonymous web-based VOD service is proposed. The proposed approach also gives pay-per-view capability.

  • PDF

An Exploratory Research on Causality among Information Technology Stress Creators in Organizations (조직 내 정보 기술 스트레스 유발요인들 간의 인과관계에 대한 탐색적 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.1-14
    • /
    • 2012
  • The purpose of this study is to explore the causality among technostress creators. In doing so, we can suggest the ways how to reduce a technostress of employees. Research results suggest that pace of change has a positive effect on the work overload and has a negative effect on work-home conflict. Complexity of technology positively influences not only work overload but job insecurity. Work overload has a significant effect on work-home conflict. Finally, work-home conflict has a positive effect on job insecurity. Conclusions and implications are discussed.

A study of access control using fingerprint recognition for Electronic Medical Record System (지문인식 기반을 이용한 전자의무기록 시스템 접근제어에 관한 연구)

  • Baek, Jong Hyun;Lee, Yong Joon;Youm, Heung Youl;Oh, Hae Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.127-133
    • /
    • 2009
  • The pre-existing medical treatment was done in person between doctors and patients. EMR (Electronic Medical Record) System computerizing medical history of patients has been proceed and has raised concerns in terms of violation of human right for private information. Which integrates "Identification information" containing patients' personal details as well as "Medical records" such as the medical history of patients and computerizes all the records processed in hospital. Therefore, all medical information should be protected from misuse and abuse since it is very important for every patient. Particularly the right to privacy of medical record for each patient should be surely secured. Medical record means what doctors put down during the medical examination of patients. In this paper, we applies fingerprint identification to EMR system login to raise the quality of personal identification when user access to EMR System. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing carries out it in client. And the confidence of hospital service is improved because login is forbidden without fingerprint identification success.

A Longitudinal Study on the Effect of e-Commerce Technology Characteristics and Personal Value on Purchasing Behavior by Importance of Information Protection (전자상거래 기술특성과 개인가치가 정보보호 중요성에 의한 구매행동에 미치는 영향에 대한 종단적 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.159-171
    • /
    • 2017
  • The purpose of this study is to investigate the effects of e - commerce technology characteristics and personal values on purchasing behavior by information security importance. The results of the empirical study that examined the university students in 2006 and 2016 are as follows. First, personal value is centered on personal values, such as self - esteem and self - esteem in 2006. In 2016, however, personal values such as self - fulfillment and personal relationship with others are important. Transactional ease and product service serve as the main value of the fun and pleasure of life, but the sense of accomplishment as the core value of information protection. Second, the technical characteristics of e-commerce are as follows. In terms of ease of transaction and product service, technology characteristics are simplified and directly effected over time. On the other hand, information protection works very closely with individual value, There was a strong tendency to enjoy benefits. Especially in 2006, if you want to enjoy transactional convenience through transaction information security or benefit from product service, it has been changed to recognize the importance of information security through payment in 2016.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF

Fingerprinting Scheme for Contents Protection in Mobile Environment (모바일 환경에서의 콘텐츠 보호를 위한 핑거프린팅 기법)

  • Yong, Seung-Lim;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.167-172
    • /
    • 2008
  • Fingerprinting scheme supports the copyright protection to track redistributors of digital content using cryptographic techniques. Fingerprinting schemes should guarantee buyer's anonymity and asymmetry for their privacy. Most of known fingerprinting schemes adopt public-key cryptosystems to achieve asymmetry and discrete logarithm problem or graph isomorphism problem to achieve anonymity. However, these schemes are not suited in mobile environment because of the drawbacks of requiring high computational complexity. In this paper, we propose an efficient fingerprinting scheme for mobile environment to provide not only asymmetry of the protocol but also transaction anonymity of the buyer. By employing symmetric encryption to encrypt the digital content and adopting agent to perform the protocols, the efficiency of the proposed scheme is improved.

An Empirical Study on the Customer Value Factors Affecting Trust of Mobile Entertainment (모바일 엔터테인먼트의 신뢰에 영향을 미치는 고객가치 요인에 관한 실증적 연구)

  • Lee, Yi-jin;Yum, Chang-sun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.59-71
    • /
    • 2020
  • The purpose of this study is to analyze the relationship between customer value and trust and the effect of trust on loyalty in the field of mobile entertainment. As smartphone use becomes more popular, the mobile business is growing rapidly. In particular, the mobile entertainment industry, such as mobile games and mobile video, is growing faster. This study was based on the main survey had conducted from 25th September 2019 to 7th October 2019 by 300 users who had experienced mobile entertainment applications in the past. Statistical analysis was performed by using the IBM SPSS v.22.0. The analysis results are as follows. First, the utility and quality of utilitarian value, enjoyment and aesthetics of hedonic value, and status enhancing of social value have significantly positive influence on trust. Second, privacy risk of social value have significantly negative influence on trust. Finally, trust has significantly positive influence on loyalty. Based on the results, we discussed the implications for the successful operation of mobile entertainment.