• Title/Summary/Keyword: digital privacy

Search Result 370, Processing Time 0.022 seconds

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Research Trends Analysis of Big Data: Focused on the Topic Modeling (빅데이터 연구동향 분석: 토픽 모델링을 중심으로)

  • Park, Jongsoon;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2019
  • The objective of this study is to examine the trends in big data. Research abstracts were extracted from 4,019 articles, published between 1995 and 2018, on Web of Science and were analyzed using topic modeling and time series analysis. The 20 single-term topics that appeared most frequently were as follows: model, technology, algorithm, problem, performance, network, framework, analytics, management, process, value, user, knowledge, dataset, resource, service, cloud, storage, business, and health. The 20 multi-term topics were as follows: sense technology architecture (T10), decision system (T18), classification algorithm (T03), data analytics (T17), system performance (T09), data science (T06), distribution method (T20), service dataset (T19), network communication (T05), customer & business (T16), cloud computing (T02), health care (T14), smart city (T11), patient & disease (T04), privacy & security (T08), research design (T01), social media (T12), student & education (T13), energy consumption (T07), supply chain management (T15). The time series data indicated that the 40 single-term topics and multi-term topics were hot topics. This study provides suggestions for future research.

A Study on Notification Method of Personal Information Usage History using MyData Model (마이데이터 모델을 활용한 개인정보 이용내역 통지 방안 연구)

  • Kim, Taekyung;Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the 4th industry, big data using AI is being used in many areas of our lives, and the importance of data is increasing accordingly. In particular, as various services using personal information appear and hacking attacks that exploit them appear in various ways, the importance of personal information management is increasing. Personal information must be managed safely even when collecting, retaining, using, providing, and destroying personal information, and the rights of information subjects must be protected. In this paper, an analysis was performed on the notification of usage history during the protection of the rights of information subjects using the MyData model. According to the Personal Information Protection Act, users must be periodically notified of the use of personal information, so we notify each individual of the use of personal information through e-mail or SNS once a year. It is difficult to understand and manage which company use my personal information. Therefore, in this paper, a personal information usage history notification system model was proposed, and as a result of performance analysis, it is possible to provide the controllability, availability, integrity, source authentication, and personal information self-determination rights.

Factors Influencing on the Intention to Use Serious Games for Healthcare: The Perspective of Valence Framework (건강 기능성 게임의 수용에 영향을 주는 요인: 감정가 프레임워크 관점)

  • Yong-Young Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.97-112
    • /
    • 2024
  • In order to verify the factors affecting the acceptance of Serious Games for Healthcare (SGHs), this study developed a hierarchical model of general and specific benefit and risk factors affecting the intention to use SGHs based on the valence framework. As a result based on 199 samples, it was revealed that perceived customization and perceived schedule flexibility had a positive effect on the perceived benefits, which, in turn, had a positive effect on the intention to use SGHs. However, among the specific risk factors, only privacy risk had a positive effect on perceived risk, but it did not have a effect on SGHs usage intention. The results related to the fact that the survey respondents were potential users of SGHs and the bias that may overestimate the benefits provided by SGHs called optimistic bias. Based on these findings, some implications were presented such as the spread and distribution of SGHs to the ordinary persons, improvement of negative perceptions of games, and the need for data-based services to refine customized services for SGHs.

WebDG - A Platform for E-Government Web Services

  • Bouguettaya, Athman;Medjahed, Brahim;Rezgui, Abdelmounaam;Ouzzani, Mourad;Liu, Xumin;Yu, Qi
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.389-404
    • /
    • 2004
  • Web services are deemed as the natural choice for deploy- ing e-government applications. Their use enables e-government to fully get advantage of the envisioned Semantic Web. In this paper, we pro- pose WebDG, a comprehensive Web Service Management System for e-government applications. It aims to improve government-citizen inter- actions through an infrastructure built around the "life experience" of citizens. WebDG provides a framework for automatically composing e- government services, optimized querying services, and preserving privacy.

  • PDF

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare

  • Kim, Eun-Jin;Lee, Byeong-Tae
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.141-146
    • /
    • 2007
  • The importance of the net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of a well-implemented the net-based customer service are enhanced customer loyalty and higher lock-in of customers, and the resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such the net-based customer service. This is partly due to the e-commerce divide, and partly due to privacy and security concerns of the customer for sharing personal information with firms. The limited level of customer adoption of the net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We find that an increase in adoption of the net-based customer service by the customer base is not always desirable for firms. and that customers who utilize such services are better off only when the overall adoption is limited.

  • PDF

RSA에 사용된 파라메터들에 관한 고찰

  • 이희정
    • Journal for History of Mathematics
    • /
    • v.16 no.3
    • /
    • pp.101-108
    • /
    • 2003
  • The RSA cryptosystem is most commonly used for providing privacy and ensuring authenticity of digital data. 1'his system is based on the difficulty of integer factoring. Many attacks had been done, but none of them devastating. They mostly illustrate the dangers of improper use of RSA. Improper use implies many aspects, but here we imply the misuse of the parameters of RSA. Specially, sizes of parameters give strong effects on the efficiency and the security of the system. Parameters are also related each other. We analyze the relation of them. Recently many researchers are interested in side-channel attacks. We also investigate partial key exposure attacks, which was motivated by side-channel attacks. If a fraction of tile secret key bits is revealed, the private key will be reconstructed. We also study mathematical background of these attacks, solving modular multivariate polynomial equations.

  • PDF

Estimation and Watermarking of Motion Parameters in Model Based Image Coding

  • Park, Min-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1264-1267
    • /
    • 2002
  • In order to achieve an advanced human-computer interface system, it is necessary to analyze and synthesize facial motions just as they are in an interactive way, and to protect them from unwanted use and/or illegal use for their privacy, various uses in applications and the costs of obtaining motion parameters. To estimate facial motion, a method of using skin color distribution, luminance, and geometrical information of a face is employed. Digital watermarks are embedded into facial motion parameters and then these parameters are scrambled so that it cannot be understood. Experimental results show high accuracy and efficiency of the proposed estimation method and the usefulness of the proposed watermarking method.

  • PDF

Study on the current direction of our country in accordance with the basic conditions for the commercialization of the UAV

  • Jo, Jong Deok;Lee, Chang Hee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.58-62
    • /
    • 2016
  • Shipping related services is attracting attention as a UAV (Unmanned Aerial Vehicle) application with the recent economy has been generally accepted drones. UAV of the existing military-driven logistics delivery, aerial photography, wireless Internet connection, broadcasting, disaster research, digital maps, transportation, advertising, meteorological, border surveillance, agricultural use, such as hobbies range of uses from up military are diverse and growing. The advantage of delivery drones seems to be an important feature of delivery of the goods, including labor-saving, long-distance transportation in cold weather. UAV is demanded by competitive performance development for commercialization. Privacy issues that may arise during the drone operation, ensuring marketability issues, control system, regulations, operational standards and specifications, etc. should be addressed. Development direction of Korea UAV based in current technology, regulation, and growth potential presented by deriving from the idea of 'GIF 2016 Gang-won Hackathon.

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF