• Title/Summary/Keyword: infringement of privacy

Search Result 126, Processing Time 0.025 seconds

Utility Analysis of Federated Learning Techniques through Comparison of Financial Data Performance (금융데이터의 성능 비교를 통한 연합학습 기법의 효용성 분석)

  • Jang, Jinhyeok;An, Yoonsoo;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.405-416
    • /
    • 2022
  • Current AI technology is improving the quality of life by using machine learning based on data. When using machine learning, transmitting distributed data and collecting it in one place goes through a de-identification process because there is a risk of privacy infringement. De-identification data causes information damage and omission, which degrades the performance of the machine learning process and complicates the preprocessing process. Accordingly, Google announced joint learning in 2016, a method of de-identifying data and learning without the process of collecting data into one server. This paper analyzed the effectiveness by comparing the difference between the learning performance of data that went through the de-identification process of K anonymity and differential privacy reproduction data using actual financial data. As a result of the experiment, the accuracy of original data learning was 79% for k=2, 76% for k=5, 52% for k=7, 50% for 𝜖=1, and 82% for 𝜖=0.1, and 86% for Federated learning.

E-government, Big Brother, Information Capitalism - Focusing on the NEIS Problem (전자정부, 빅 브라더, 정보자본주의 - 네이스 문제를 중심으로 -)

  • Hong Seong-Tae
    • Journal of Science and Technology Studies
    • /
    • v.4 no.1 s.7
    • /
    • pp.31-57
    • /
    • 2004
  • Controversies over NEIS(Network of Education Information System) began with very deep concern about infringement of human rights stemming from NEIS. A large information system which accumulates and uses huge size of individual information is always able to deeply infringe on human rights. But the ministry of education would not do the best not to be 'Big Brother' being dazzled by instrumental efficiency of information technology. NEIS has demonstrated problems of the information policy of Korea strongly driven in the name of 'E-goverment'. It has very strong characteristic of the statist economic growth policy focusing on more economic possibility than other. In this situation, making money is easily considered more important than protecting human rights. Information capitalism is nurtured at the sacrifice of human rights. So, we have to face problems of 'E-goverment' in order to correct the NEIS problem, The most important task to correct the NEIS problem is to make an element law protecting privacy and to establish an independent national institute protecting privacy

  • PDF

A Study on the Adoption Factors and Performance Effects of Mobile Sales Force Automation Systems (모바일 SFA(mSFA) 시스템의 수용 요인 및 도입 성과에 관한 연구)

  • Kim, Dong-Hyun;Lee, Sun-Ro
    • Korean Management Science Review
    • /
    • v.24 no.1
    • /
    • pp.127-145
    • /
    • 2007
  • This study attempts to examine the acceptance factors of mSFA systems based on the innovation diffusion and technology acceptance model, and to measure the performance effects of mSFA systems using BSC metrics. Results show that (1) the characteristics of mobility and interactivity have positive impacts on perceived usefulness, ease of use, and professional fit. But the characteristics of personal identity were not perceived as useful due to users' negative feelings about privacy infringement and surveillance. (2) Job fit has positive impacts on perceived usefulness and professional fit. (3) Perceived usefulness, ease of use, and professional fit positively influence the degree of users' dependence on mSFA systems, which have positive impacts on users' performance measured by the personal BSC metrics including perspectives of finance, customer, internal process, and learning and growth.

Legal Issues In Information Management (정보관리와 관련된 법적문제)

  • Lee Soon Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.19
    • /
    • pp.23-61
    • /
    • 1990
  • Libraries and information centers are no different from any other institutions in our society. Today, their managers have to make many more decisions which have certain legal implications than before. The ignorance of the law on their parts can not be an acceptable excuse anymore, since. the consequences sometimes maybe quite serious. This paper outlines some important legal issues involved in the services and management of libraries and information centers. They are: constitutional rights on human knowledge activities: library act and it's related laws; censorship and right to know; information access and the protection of privacy: library services and copyright law; labor relations; protections of the people and properties of the institutions, etc. The laws are not static: rather, they change with the social, political and technological environments. The managers, as well as the staff members of libraries and information centers should be constantly updated with the changes in the field, in order to give the maximum service to the clients and to prevent any infringement of the laws, which may discredit their services and the institutions.

  • PDF

A Study on Monitoring Technique for Home Server based on Web Camera (웹 카메라 기반 홈 서버용 모니터링 기술에 관한 연구)

  • Jeong Jong-Geun;Cheon Sung-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1754-1761
    • /
    • 2005
  • A monitoring system for the security is increasingly demanded in line with the issue of the infringement of privacy. This paper has conducted the study on the monitoring technique via the Internet using PC or PDA. This is a monitoring system for web-camera based home server, which transmits the images and sound data captured by mike-embedded USB camera, though multiplexer of H.263 and internet. It integrates the operating processors of each device into a unified drive module and provides it the operator to facilitate the system operation and maintenance.

A Study on the Sound Insulation performance Survey Estimation in Apartment house (공동주택의 소음성능 실측평가에 관한 연구)

  • 함진식;박명길
    • Journal of the Korean housing association
    • /
    • v.12 no.4
    • /
    • pp.219-226
    • /
    • 2001
  • This treatise measures and estimate sound insulation performance of apartment house. Sound insulation performance measured to the floor and wall. Measurement object is apartment occupancy ago of 100㎡ scale built to higher story in Taegu city. Floor Slav's light impact sound level interception performance interacted by benevolent person who carrying out availability of finish material important. Floor Slav's heavy impact sound level interception performance amounted estimation by being good more or less then light impact sound level interception performance. Because sound insulation performance of partition between adjoined generation is gad seldom, privacy infringement becomes anticipation. There was discussion about these results, and presented various kinds future research task to prove sound insulation performance of apartment house.

  • PDF

A Study on the Factors Affecting Drone Use Intention -Comparative analysis of Korea and United Kingdom

  • Park, Seo Youn
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.6
    • /
    • pp.33-41
    • /
    • 2021
  • As interest in drones controlled by remote technology rapidly increases worldwide, drones are used in many fields such as military, rescue, and transportation as future innovations in many countries. In particular, as the drone has been spotlighted as a new future strategic industry, it is also used for public purposes such as disaster relief and crime investigation. However, security concerns such as the penetration of major national facilities, collisions with aircraft, and the possibility of privacy infringement due to aerial photography are also being raised. Unlike the increased interest in drones, there have been few studies on drone use, drone safety, and public attitudes toward drone use. This paper analyzed the perceptions of drone attitudes, drone stability and policy support for drones for Korean and United Kingdom.

A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment

  • Lee, Donghyeok;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.263-270
    • /
    • 2017
  • Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users' life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.

A Study on Developing the Model of Reasonable Cost Calculation for Privacy Impact Assessment of Personal Information Processing System in Public Sector (공공기관 개인정보 처리시스템의 개인정보 영향평가를 수행하기 위한 합리적인 대가 산정 모델 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.22 no.1
    • /
    • pp.47-72
    • /
    • 2015
  • According to the progress of national informatization throughout the world, infringement and threaten of privacy are happening in a variety of fields, so government is providing information security policy. In particular, South Korea has enhanced personal impact assessment based on the law of personal information protection law(2011). But it is not enough to effect the necessary cost calculation standards and changeable factors to effect PIA. That is, the budgets for PIA was calculated lower than the basic budget suggested by Ministry of Government Administration Home affairs(2011). Therefore, this study reviewed the cost calculation basis based on the literature review, cost basis of similar systems, and reports of PIA and obtained to the standard with Delphi analysis. As a result, the standards of PIA is consisted to the primary labors and is utilized to how the weights by division of target system, construction and operating costs of target system, type of target systems, etc. Thus, the results of this study tried to contribute to ensure the reliability of PIA as well as the transparency of the budget for privacy in public sector.

A Study on Survey of Improvement of Non Face to Face Education focused on Professor of Disaster Management Field in COVID-19 (코로나19 상황에서 재난분야 교수자를 대상으로 한 비대면 교육의 개선에 관한 조사연구)

  • Park, Jin Chan;Beck, Min Ho
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.640-654
    • /
    • 2021
  • Purpose: Normal education operation was difficult in the national disaster situation of Coronavirus Infection-19. Non-face-to-face education can be an alternative to face to face education, but it is not easy to provide the same level of education. In this study, the professor of disaster management field will identify problems that can occur in the overall operation and progress of non-face-to-face education and seek ways to improve non-face-to-face education. Method: Non-face-to-face real-time education was largely categorized into pre-class, in-class, post-class, and evaluation, and case studies were conducted through the professor's case studies. Result&Conclusion: The results of the survey are as follows: First, pre-class, it was worth considering providing a non-face-to-face educational place for professors, and the need for prior education on non-face-to-face educational equipment and systems was required. In addition, it seems necessary to make sure that education is operated smoothly by giving enough notice on classes and to make efforts to develop non-face-to-face education programs for practical class. Second, communication between professor and learner, and among learners can be an important factor in non-face-to-face mid classes. To this end, it is necessary to actively utilize debate-type classes to lead learners to participate in education and enhance the educational effect through constant interaction. Third, non-face-to-face post classes, policies on the protection of privacy due to video records should be prepared to protect the privacy of professors in advance, and copyright infringement on educational materials should also be considered. In addition, it is necessary to devise various methods for fair and objective evaluation. According to the results of the interview, in the contents, which are components of non-face-to-face education, non-face-to-face education requires detailed plans on the number of students, contents, and curriculum suitable for non-face-to-face education from the design of the education. In the system, it is necessary to give the professor enough time to fully learn and familiarize with the function of the program through pre-education on the program before the professor gives non-face-to-face classes, and to operate the helpdesk, which can thoroughly check the pre-examination before non-face-to-face education and quickly resolve the problem in case of a problem.