• Title/Summary/Keyword: infringement of privacy

Search Result 126, Processing Time 0.023 seconds

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

The Customer Knowledge Structure for Building Perceived Value and Reputation of Location-based App Service (위치기반 앱 서비스를 통한 인지된 가치와 평판 형성을 위한 소비자 지식 구조)

  • Sohn, Bong-Jin;Choi, Jaewon
    • Knowledge Management Research
    • /
    • v.18 no.1
    • /
    • pp.159-176
    • /
    • 2017
  • Recently, the popularity of smartphones has led to a dramatic increase in the frequency of use of App(Application) services. LBS (Location-Based Service) App service adopts various methods such as push marketing and useful information by region through providing location-based service based on the location of the consumer. In particular, an enterprise or an App management company can provide necessary information to the consumer through the necessary information among the customer related knowledge information obtained by utilizing the location information of the consumer in real time. Nevertheless, since LBS is a service that can be performed only when the company obtains consent to provide location information voluntarily by the consumer, there is a case of privacy infringement due to consumers' use of personal information. The purpose of this study is to identify the characteristics of privacy related variables and the knowledge structure for consumer value formation based on the theory of privacy calculation. We also compared the characteristics of Korea with those of China in privacy issue. As a result of the analysis, it was confirmed that factors such as information utilization ability and information control ability were influential as a key factor of privacy calculation. In addition, perceived value influences the reputation of the LBS App service.

The Perception Survey for Personal Health Information Protection of First Aid Training Courses Students - Focused of EMT students and Nursing students - (응급처치 교육과정을 배우는 학생들의 개인의료정보 보호에 대한 인식도 조사 - 응급구조과와 간호과 학생을 중심으로 -)

  • Bae, Sung-Ju;Choi, Young-Jin
    • Journal of Korean Clinical Health Science
    • /
    • v.2 no.1
    • /
    • pp.25-34
    • /
    • 2014
  • Purpose. The checked of perception for the protection of personal medical information of EMT student and Nursing student. Methods. Nursing students and EMT students 200 questionnaires were collected and Frequency analysis, Chi-square test, one-way ANOVA was performed for using the Windows SPSS(ver. 12.0). Results. Most of the subjects were aware of the protection law of personal information and Infringement of the privacy of personal information will be exposed. also, Education is needed privacy(EMT students $3.84{\pm}0.96$, Nursing students $3.73{\pm}0.99$). EMT($3.99{\pm}1.00$) and Nursing($4.07{\pm}0.94$)students due to exposure to both the patient's personal information privacy was violated would get recognized. Exposure to the computerization of information privacy will be exploited in other agencies(EMT students $3.78{\pm}0.88$, Nursing students $3.95{\pm}0.94$) was called. Conclusions. For the protection of personal health information, education needs to be expanded.

A Grounded Theory Approach to the Procedure of Customized Service Experiences (온라인 맞춤형 서비스 경험 과정에 관한 근거이론적 연구)

  • Kim, Chae Ri;Lee, Jung Hoon;Kwon, Won Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • As data grows rapidly, the provision of appropriate information needed by individuals has become an area of new services, and customized services which is enabling the analysis of optimal services through collecting, storing, and analyzing personal data are emerging in many fields. However, due to the characteristics of customized services based on various information collected by customers during the use of the service, the problem of privacy infringement is raised at the same time, and many studies are being actively conducted to solve this problem. This study seeks to explore how the customer's in-depth and customized services has an impact on their customers, which has not been derived from quantitative research using the grounded theory methodology. Through this, 84 concepts, 33 subcategories, 13 Categories and paradigm models were derived. In addition, 'Understanding and acceptance of online behavioral advertising (OBA)' was derived as a core category, and finally, acceptance types of OBA were classified into 'positive acceptance type', 'indifferent type', 'calculating type', and 'active resistance type' based on the key categories. This study divides the acceptance types of online behavioral advertising through the emotions and behaviors of the consumers throughout the procedure of online behavioral advertising experiences. In addition to the statistical and quantitative information currently used for providing behavioral advertising, it provides new criteria to reflect the refinement of behavioral advertising and personal tendencies or characteristics.

A Study on the Surveillance Camera System for Privacy Protection (프라이버시 보호를 위한 감시카메라 시스템에 관한 연구)

  • Moon, Hae-Min;Pan, Sung-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1779-1786
    • /
    • 2009
  • Due to increased terrors and crimes, the use of surveillance camera systems including CCTV is also increasing. Private information such as faces or behavior patterns can be recorded in CCTV and when it is exposed, it may cause infringement to privacy and crimes. This paper analyses conventional methods on protection of privacy in surveillance camera system and then suggests an RFID-based surveillance camera system that can both watch crimes and protect privacy. The proposed system protects privacy and watches crimes using scrambling and an RFID system.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

The Empirical Study on User Factor of LBS(Location-Based Service) Application Service in Mobile (모바일 LBS(Location-Based Service)응용 서비스의 사용자요인에 대한 실증적 연구)

  • Yim, Ki-Heung;Park, Eun-A
    • Journal of Information Technology Services
    • /
    • v.6 no.3
    • /
    • pp.225-239
    • /
    • 2007
  • Mobile service is highly becoming in the limelight on information society by offering infringement problem about individual privacy or information by political and scientific interest This study is focusing on primary LBS application Mobile service that emphasize position confirmation, especially, looking for friends. The aim at this study grasps user productivity factor of LBS application Mobile service, and analyses whether some have relations with value and action determination of LBS application Mobile service. According to result, Mobile service applying position service is supported with usefulness and system quality, adaptedness. On the other hand, Usability and social effect, privacy weren't embossed by leading person. Mobile service applying position service is changed with a person who have experience looking for friend. This study has systematically analysed about LBS application service by leading person

A RFID Privacy protection system using H/W friendly security algorithm Environment (하드웨어 친화적인 암호 알고리즘을 사용한 RFID 프라이버시 보호 시스템)

  • Kim, Jin-mook;Ryou, Hwang-Bin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.280-284
    • /
    • 2005
  • In ubiquitous computing environment, An RFID system will be the important way that recognizing an object instead of Bar-code system. But a privacy infringement problem is predicted between a tag and leader to be serious. There is many difficulty that just uses an existing research method because it has an Hardware restriction. Therefore we will suggest that A RFID Privacy Protect system using Hareware friendly security algorithm. we will use RC5 and CBC_MAC because the tag has hardware restriction .To implement, We will simulate and test on One chip microprcessor environment. In the result of the experiment, We will know that a suggested system solves privacy problem on RFID system that it was using CBC-MAC and RC5 security algorithm.

  • PDF

The Study for Privacy Trust Zone of Smart Monitoring in Mobile Environment (모바일 환경에서 스마트한 모니터링이 가능한 프라이버시 신뢰 존 정보 제공 시스템에 관한 연구)

  • Kang, Jang-Mook;Lee, Woo-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.63-68
    • /
    • 2010
  • Mobile devices like iphone, ipad, kindle, and PDA are used as everyday tool. In the mobile environment, smart phones and other mobile units are also used as a tool for protection or infringement of personal information. Therefore, smart monitoring technology is required to protect personal information and privacy. On the other hand, with smart phones and the mobile environment, diverse application technologies are realized on hardware and software platforms. Therefore, this paper designs the network structure that forms privacy trust zone, and based on this, deals with the monitoring and monitoring prevention system with a focus on CCTV, through which this paper proposes a system that provides privacy trust zone information and its utilization which is capable of smart monitoring.

The Effect of Technology Infringement on Consumer's Attitude Change Depending on Brand Reputation: Focusing on the Under-dog Effect of Weak Brand (브랜드 명성에 따른 기술 침해에 대한 소비자의 태도 변화: 약자 브랜드의 언더독 효과를 중심으로)

  • Kim, Keon-Woo;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.167-187
    • /
    • 2018
  • Purpose The purpose of this study is to confirm the factors for explaining the consumer behavior when occur patent litigation and technology infringement of each conditions which are brand reputation gap, technology importance and technology leakage attribution based on the Attribution Theory. Design/methodology/approach This study made a design of the research model by 2x2x2 factorial design deducted and performed 3-way ANOVA then analyzed 2-way AVOVA with brand reputation gap as center from technology importance and technology leakage attribution on the basis of the Attribution Theory. Findings According to the empirical analysis result, this study confirmed that consumer attitude has no difference regardless of technology leakage attribution when top-dog vs. under-dog situation and top-dog vs. top-dog situation. Also, this study confirmed that when under-dog infringe important technology, consumer show more positive attitude than the other. On the other hand, top-dog infringe important technology, consumer show more negative attitude than the other.