• Title/Summary/Keyword: k-익명성

Search Result 172, Processing Time 0.029 seconds

Social Media Uses: ethical factors and the effects for teenagers (소셜 미디어 이용: 청소년 대상 윤리적 요인과 그 영향)

  • Lee, Hyun-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.477-487
    • /
    • 2017
  • This study is for empirical analyzing the ethical contents in using social media, such as what kind of ethical responsibility do the teenage users have, how do they recognize the ethical concept in producing or sharing the information and how these ethical factors affect their behavior of social media uses. After survey with the structured questionnaire, statistical analyses with available 227 cases are processed. As a result, there are 4 ethical factors in using social media which as included 'privacy', 'copyright', 'fullness', 'accuracy', 'truth-telling', 'fairness', 'relief of harmful effect', 'credibility', 'objectivity', 'impartiality', included 'moderation', 'respect', 'autonomy', 'control', 'care of mischief', included 'interactivity', 'multiplicity', 'anonymity', 'divergence', 'social community', included 'transparency', 'openness'. All these ethical factors are positive correlated to the level of social media users' opinion expression, opinion support, information leading, information searching. Especially, is the most effective factor to social media users' behavior.

A Ticket based Authentication and Payment Scheme for Third Generation Mobile Communications (3세대 이동 통신을 위한 티켓 기반 인증 및 지불 기법)

  • Lee, Byung-Rae;Chang, Kyung-Ah;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.368-374
    • /
    • 2002
  • In the third generation mobile telecommunication systems such as UMTS, one of the important problems for value-added services is to check the recoverability of costs used by a mobile user. Previous authentication and payment schemes for value-added services by a mobile user across multiple service domains, rely on the concept of the on-line TTP, which serves as the users certification authority. In the third generation systems with many service providers, a wide range of services, and a diverse user population, authentication mechanisms with the on-line TTP provide a far from ideal solution. In this paper we present an efficient public-key protocol for mutual authentication and key exchange designed for value-added services in the third generation mobile telecommunications systems. The proposed ticket based authentication and payment protocol provides an efficient way for VASP to check the recoverability of costs without communication with the on-line TTP Furthermore, the proposed ticket based protocol can provide anonymous service usage for a mobile user.

A Study of Concurrency Control Scheme for Scalability of Blockchain Technology (블록체인 기법의 확장가능성을 위한 병행 수행 제어 기법에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.569-570
    • /
    • 2017
  • Bitcoin-based blockchain technology provides an infrastructure that enables anonymous smart contracts, low-cost remittances, and online payments. However, the block-chain technology that implements the bitcoin has scalability constraints in tradeoffs between throughput and latency. To solve these problems, the Byzantine fault tolerant block-chain technique has been proposed. This technique improves throughput without increasing latency by selecting a leader and constructing many microblocks that do not contain proofs of work within the existing block by the leader. However, this technique may be less secure than existing techniques in selecting the reader. In this paper, we propose a technique for scalability of the blockchain technology by using microblock technology and parallel execution technique. Within one microblock there is information about several transactions. In the proposed scheme, the throughput of the microblocks can be increased by performing concurrently.

  • PDF

A Study of Covert Narcissism in Adolescent Internet Addiction : Relationship to Anonymity, Presence, Interactivity, and Achievement Motivation (청소년 인터넷 중독에서의 내현적 자기애에 관한 연구 : 익명성, 실재감, 상호작용성, 성취 동기와의 연관)

  • Choi, Won-Hee;Son, Jung-Woo;Kim, Yeoung-Rang;Lee, Sang-Ick;Shin, Chul-Jin;Kim, Sie-Kyeong;Ju, Ga-Won
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.22 no.2
    • /
    • pp.103-111
    • /
    • 2011
  • Objectives : This study compared covert narcissistic propensity in adolescents with internet addiction tendency to normal adolescents. Further, we investigated the correlation between such propensities and anonymity in cyberspace, presence feeling and interactivity in internet gaming, and achievement motivation in adolescents with internet addiction tendencies. Methods : Male middle school students with internet addiction tendencies (Addiction Tendency Group, N=27) and normal students (Control Group, N=29) were recruited. The scale of internet use, Covert Narcissism Scale, scale of achievement motivation, scale of anonymity in cyberspace, scale of presence feeling in internet games, and the scale of interactivity in internet games were administered. A comparison of the average scores and correlation analyses were performed. Results : 1) Compared with Control Group, the Addiction Tendency Group showed significantly higher scores on all subscales of the Covert Narcissism Scale, and both the scale of presence feeling and that of interactivity in internet games. Further, the score on the scale of achievement motivation for the Addiction Tendency Group was significantly lower than that of the Control Group. 2) In the Addiction Tendency Group, the scores on several subscales of the Covert Narcissism Scale were significantly positively correlated with the scores on the scale of presence feeling in internet games, anonymity in cyberspace, and interactivity in internet games. However, in the Control Group, the scores of several subscales on the Covert Narcissism Scale were significantly negatively correlated with the score on the scale of achievement motivation, and was significantly positively correlated with the score on the scale of interactivity in internet games. There were no other significant correlations between the scores on the subscales of the Covert Narcissism Scale and the scores of either presence feeling in internet games or anonymity in cyberspace. Conclusion : These results suggested that adolescents with a tendency to be addicted to the internet exhibited higher covert narcissistic propensities than normal adolescents and that the covert narcissistic tendencies were related with presence feeling in cyber games as well as with anonymity in cyberspace.

Evaluation of Hypertension Prevention and Management Programs Conducted by Community Health Nurse Practitioners in Rural Areas of Korea (농촌지역 보건진료소의 고혈압 예방 및 관리사업 평가)

  • Kwon, Myung-Soon;Cho, Won-Jung;Kim, Mi-Ja;Lee, Hyeon-Kyeong
    • Korean Journal of Health Education and Promotion
    • /
    • v.27 no.5
    • /
    • pp.41-50
    • /
    • 2010
  • Objectives: This study aims to evaluate effectiveness of hypertension prevention and management programs (HPMPs) in rural Korea. Methods: A questionnaire survey was conducted with 700 community health practitioners working at primary health care posts (PHCPs). The questionnaire had four domains, which were hypertension management, hypertension prevention, the PHCP environment, and evaluation system, each with different maximum weighted values (WVs). Weighted values of 100 indicate the best effectiveness for the HPMP in all four domains. Results: The average WVs and percent effectiveness of all four domains combined was 61.65 (62%); the hypertension management domain was 28.81 (72%); the hypertension prevention domain was 23.44 (67%); the PHCP environment was4.29(43%); and the evaluation system was5.10(34%). Conclusion: The HPMPs were generally effective, and hypertension management was the most effective. The environment of PHCPs and the evaluation system of HPMPs should be improved to increase the effectiveness of the HPMPs.

A Study of Uncertainty Factors Affecting Consumers' Purchase Intention in Online Shopping (온라인 쇼핑에서 소비자의 구매의도에 영향을 미치는 불확실성 요인에 관한 연구)

  • Dilshodjon, Gafurov;Shin, Ho Young;Kim, Kisu
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.45-68
    • /
    • 2013
  • Despite improved technologies, procedures, and regulations, consumers are still uncertain about purchasing online. The objective of this study is to understand uncertainty factors in online shopping and their relationships with the consumers' intention to purchase. For this objective we derived seller anonymity, lack of product transparency, and lack of process transparency as uncertainty factors from previous researches which may affect consumers' perceived uncertainty on online shopping. Then, a causal model was developed to conceptualize the relationships between these uncertainty factors as antecedent variables and consumer's intention to purchase as consequent variable with perceived uncertainty as an intermediary variable. Purchase involvement was used as a moderating variable on the relationship between perceived uncertainty and the intention to purchase online. The model was tested empirically to find meaningful relationships among these variables. The findings indicate that all antecedent variables affect perceived uncertainty significantly and perceived uncertainty negatively affects consumers' intention to purchase. Moreover, the results of analysis show purchase involvement has a significant moderating effect on the relationship between perceived uncertainty and intention to purchase online.

  • PDF

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board (익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구)

  • Min, So-Yeon;Jang, Seung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4214-4223
    • /
    • 2012
  • The argument related to the use of real and anonymous names on the Internet bulletin board has recently become a main issue. When using real names, it is possible to violate free discussion and privacy. Also, when using anonymous names, it is possible to have the reverse function of the Internet in regard to the use of malicious replies or the distribution of false ideas. Therefore, this paper has made it possible to prevent the spread of the user's personal information and execute the single log-in process by using the XML-token method which is one of the SSO technologies. Also, by issuing virtual IDs and forming the path when establishing tokens, the anonymous bulletin board which provides anonymity with a conditional tracing process has been suggested. After analyzing the performance of visitor numbers at authentication time, the anonymous bulletin board based on the group signature method showed the average response rate of 0.72 seconds, 0.18 seconds, which was suggested scheme. In the authentication time 4-5 times faster response speed, respectively. Also, since the suggested system does not have to provide a single authentication process or make the user provide his or her signature, the level of user's convenience seems to be much higher. Such a result shows that the system suggested on the anonymous bulletin board has a more appropriate level of user's convenience.

The Search of the Crime Prevention Method through the Crime Pattern to Apartment Type (아파트의 형태에 따른 범죄유형과 범죄예방 방법 모색)

  • Choi, Hwan-Young;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.23-31
    • /
    • 2007
  • Apartments are built in small countries to accommodate densely populated cities and maximize urbanization. Many apartment complexes have been built in recent reconstruction or redevelopment projects. An increase in crime has resulted due to residents living in a narrow space. Larceny is the most commonly reported crime in apartment complexes. Apartments can be classified as stairway, hallway, or plane surface. This study compares and analyzes the frequency of theft by apartment type to assist in creating a safer residential space. In America and England, scholars studied to make a safer residential space, and have applied the theory of 'the Defensible Space' and 'Crime Prevention Through Environmental Design(CPTED)' since 1970s. Korean apartment design now reflects CPTED in new apartment construction. In this study, 12 apartment complexes were selected in Changwon city to conduct analysis of theft in selected complexes. The study will cover housing invasion theft, motorcycle and car theft and snatching. The most frequency larceny is motorcycle and car theft, the second is housing invasion theft, and the least frequent is snatching. More residents' motorcycles and cars are damaged in a hallway style apartment. More frequently inhabitants have their possessions snatched on a stairway form. 1) When we build new apartment complexes, we must plan to improve territoriality and enhance a natural surveillance by reinforcing dwellers' relationship. Through planning we can prevention the larceny in apartments.

  • PDF

Effectiveness of the Internet Real-Name Verification Law: Evidence from Self-censorship and Intention to Detour the Regulation (인터넷실명제와 우회로의 선택: 인터넷 공론장 참여자들의 자기검열과 우회로 선택의향을 중심으로)

  • Han, Hye-Kyung;Kim, Eu-Jong
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.50-73
    • /
    • 2011
  • This paper investigates the effectiveness of Real-Name System on Internet, which has been applied to some Internet service provider bulletin boards in Korea. The goal of the Real-Name system on the Internet is controlling expression of slanderous or abusive language. The effectiveness of the regulation is dependent on the people's perceptions and attitude toward to the legislation. This empirical study examines the antecedents that affect the perceptions and attitude toward the regulation. Further, we investigate the relationships among variables such as internet public sphere participation, attitude to the regulations, and intention to choose detours. Results of regression analysis show that the younger and the more progressive individuals are, the more they oppose the implementation of the law. Also, it was found that people who have more political interest and participate more actively in public sphere via internet, tend to oppose the law. Structural equation models reveal that participation in online public sphere drives negative attitudes about the regulation. In addition, people with negative perceptions about the law tend to choose the detours such as 'cyber asylum' and 'service asylum'.

  • PDF