• 제목/요약/키워드: information Protection

검색결과 4,475건 처리시간 0.037초

정보사회에서의 소비자 개인정보보호에 관한 연구 (A Study on Consumer Personal Information in Information Society)

  • 남수정;김기옥
    • 대한가정학회지
    • /
    • 제37권10호
    • /
    • pp.55-66
    • /
    • 1999
  • The purpose of this study is to propose consumer policy related to the protection of personal information on the basis of regulations and laws in the developed countries. From this study, implications for the protection consumer privacy are discussed as follows. First, Consumer education is needed to enhance consumers'knowledge on their privacy right and this should be done not only by private consumer organization but also by businesses. Second, Businesses should realize ethical responsibilities of consumers'privacy right when they use personal information by databasemarketing. Finally, Government should establish a privacy law concerning both public and private sectors.

  • PDF

개인정보 유출 방지를 위한 NFC 기반 GCM 서비스를 이용한 차량 상황 알림 시스템 개발 (Development of Vehicle Status Alerts System for Personal Information Leakage Protection using the NFC-based GCM Service)

  • 강현민;최현수;차경애
    • 한국멀티미디어학회논문지
    • /
    • 제19권2호
    • /
    • pp.317-324
    • /
    • 2016
  • This paper proposes a message transfer application using smartphone with NFC(Near Field Communication) and GCM(Goolge Cloud Messaging) technology for prevention of personal information leakage. In implementing for the proposed system, we design a NFC-based vehicle status alerts service which make it possible to communicate with smartpone message without phone-number between a car driver and an unspecified person. The application provides message communication mechanism without exposing the real phone number, using the NFC tag written with the driver's smartphone device ID and GCM push messages. Through the evaluation result of the actual implemented application, the proposed system can be efficient technology in protection for leakage of personal information such as personal phone- number in daily life.

개인정보 보호에 대한 의료기관 종사자들의 지식, 인식과 실천 (Hospital Employees' Knowledge, Recognition and Practice on the Protection of Personal Information)

  • 정지나;문인오
    • 대한한의정보학회지
    • /
    • 제21권1호
    • /
    • pp.1-13
    • /
    • 2015
  • The aim of this study was to investigate hospital employees' knowledge, recognition and practice on the protection of personal information. A total of 250 hospital employees were selected using convenient sampling in J province. The data were collected using self-reported questionnaire and were analyzed using SPSS 18.0 program and descriptive statistics, Chi-squire test, t-test, ANOVA, and Pearson correlation coefficients. Average score for knowledge, recognition and practice were significantly associated with gender, education, hospital size and there was a correlation among knowledge, recognition and practice. The results of this study will help to develop education program on the protection of personal information for hospital employees.

  • PDF

불법 흥신소 및 심부름센터 개선방안에 관한 연구 (A Study on the Improvement for An Illegality Detective Agency and Messenger Office)

  • 김일곤;정귀영
    • 융합보안논문지
    • /
    • 제14권6_2호
    • /
    • pp.53-62
    • /
    • 2014
  • 이 연구의 목표는 다양한 사회적 문제를 양산하고 있는 현재의 불법행위 흥신소 및 심부름센터의 선진화 방안에 대한 고찰이다. 연구결과는 다음과 같다. 첫째, 관련업종의 불법적 위법 행위룰 방지하기 위해 유사 업종인 산업근거법인 경비업법 적용의 고려이다. 둘째, 해당업종 종사자에 대한 전문자격제도의 도입이다. 셋째, 흥신소 및 심부름센터와 같은 기존의 직업군을 새로운 직업군으로 창출하여 양성화하는 것이다. 넷째, 관할감독기관 선정과 엄격한 관리 감독이다.

어플리케이션의 가상 메모리 보호를 위한 연구 (A Study for Protecting the Virtual Memory of Applications)

  • 김동율;문종섭
    • 대한임베디드공학회논문지
    • /
    • 제11권6호
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

Information Communication Ethical Study on the Protection of Digital Copyrights and Alternatives: Focusing on the Secondary School Students

  • Huh, Junho
    • Journal of Multimedia Information System
    • /
    • 제3권2호
    • /
    • pp.27-34
    • /
    • 2016
  • In the past, the judicial circles in the Republic of Korea (ROK) were generous to the online copyright violations of computer software compared to other academic areas or offline violation. However, they started to reconsider such a practice since the FTA talks with some advanced countries began so that new laws had to be established, especially after the first round of negotiations with United States of America (USA) in 2006 during which they changed their views on the matter. Now it became possible to penalize digital copyright violations through lawsuits, and from March 1st, 2017, the court is expected to abolish the nonsuit system for teenagers. Thus, this paper has reviewed the ethical aspects involved in digital copyright protection and examined the possible alternatives, dividing them into three broad groups, before proposing a digital copyright protection curriculum for secondary education.

Intelligent Approach for Android Malware Detection

  • Abdulla, Shubair;Altaher, Altyeb
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권8호
    • /
    • pp.2964-2983
    • /
    • 2015
  • As the Android operating system has become a key target for malware authors, Android protection has become a thriving research area. Beside the proved importance of system permissions for malware analysis, there is a lot of overlapping in permissions between malware apps and goodware apps. The exploitation of them effectively in malware detection is still an open issue. In this paper, to investigate the feasibility of neuro-fuzzy techniques to Android protection based on system permissions, we introduce a self-adaptive neuro-fuzzy inference system to classify the Android apps into malware and goodware. According to the framework introduced, the most significant permissions that characterize optimally malware apps are identified using Information Gain Ratio method and encapsulated into patterns of features. The patterns of features data is used to train and test the system using stratified cross-validation methodologies. The experiments conducted conclude that the proposed classifier can be effective in Android protection. The results also underline that the neuro-fuzzy techniques are feasible to employ in the field.

한국 서남 해상 풍력발전단지 통신망 연구 (Communication Network Architectures for Southwest Offshore Wind Farm)

  • 압델 하미드 모하메드;김영천
    • 한국통신학회논문지
    • /
    • 제42권1호
    • /
    • pp.88-97
    • /
    • 2017
  • With the increasing of the penetration rate of large-scale wind farms, a reliable, highly available and cost-effective communication network is needed. As the failure of a WF communication network will significantly impact the control and real-time monitoring of wind turbines, network reliability should be considered into the WF design process. This paper analyzes the network reliability of different WF configurations for the Southwest Offshore project that is located in Korea. The WF consists of 20 WTs with a total capacity of 60 MW. In this paper, the performance is compared according to a variety of indices such as network unavailability, mean downtime and network cost. To increase the network reliability, partial protection and full protection were investigated as strategies that can overcome the impact of a single point of failure. Furthermore, the reliability performances of different network architectures are analyzed, evaluated and compared.

Roles of Threat and Coping Appraisal in Adoption of Green Information Technology: Ordered Protection Motivation Theory Perspective

  • Lee, Namyeon;Jin, Yanshou;Kwon, Ohbyung
    • Asia pacific journal of information systems
    • /
    • 제23권2호
    • /
    • pp.87-109
    • /
    • 2013
  • While many surveys show very positive attitudes on the part of consumers towards eco-friendly products, the market share actually reflecting green IT purchases remains low in most countries. The motivations behind green IT purchase behavior are still obscure. Several studies have addressed the question of green IT diffusion from economic and normative viewpoints in an attempt to interpret IT adoption behavior. This study comes at the question from a different angle, namely negative frame, examining threat and coping behaviors using the Ordered Protection Motivation (OPM) model and threat appraisal theory. The results show that attitudes toward fairness and positive change, which are precedents of threat appraisal, play an important role in determining threat appraisal. Perceived threats in the green IT arena include habit change and ecological change. Appraisal for coping with these threats directly affects initial adoption behaviors regarding available green IT, and then indirectly encourages the purchase of new green IT products.

  • PDF

기존의 CC 평가제도의 한계와 cPP의 등장으로 인해 개정되는 새로운 CC 평가제도 분석 (Limitations of Common Criteria and Analysis of future Common Criteria with Collaborative Protection Profile)

  • 최현덕;이옥연
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.832-834
    • /
    • 2015
  • 최근 CCRA(Common Criteria Recognition Arrangement) 협정서 개정에 따라 공통평가기준인 CC(Common Criteria) 평가제도에 변화가 생기고 있다. 현재의 CC 평가제도가 가지는 한계를 보완하고자 PP(protection profile)를 대신하는 cPP(collaborative protection profile)가 개발되었는데, 기존의 폐쇄적으로 운영되던 PP 개발 프로세스와 달리 cPP 개발에는 CCRA 회원국의 여러 기관 및 기업이 적극적으로 개발에 참여할 수 있다. 따라서 현재 세계 각국에서 cPP 개발에 관한 논의가 활발히 진행되고 있으며 세분화된 연구도 요구되고 있다. 본 논문에서는 기존의 CC 평가제도가 가지는 한계를 살펴보고 이러한 한계를 극복하기 위한 cPP의 등장 및 개정되는 새로운 CC 평가제도의 운영을 분석한다.