• Title/Summary/Keyword: link privacy

Search Result 14, Processing Time 0.034 seconds

An Uncertain Graph Method Based on Node Random Response to Preserve Link Privacy of Social Networks

  • Jun Yan;Jiawang Chen;Yihui Zhou;Zhenqiang Wu;Laifeng Lu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.147-169
    • /
    • 2024
  • In pace with the development of network technology at lightning speed, social networks have been extensively applied in our lives. However, as social networks retain a large number of users' sensitive information, the openness of this information makes social networks vulnerable to attacks by malicious attackers. To preserve the link privacy of individuals in social networks, an uncertain graph method based on node random response is devised, which satisfies differential privacy while maintaining expected data utility. In this method, to achieve privacy preserving, the random response is applied on nodes to achieve edge modification on an original graph and node differential privacy is introduced to inject uncertainty on the edges. Simultaneously, to keep data utility, a divide and conquer strategy is adopted to decompose the original graph into many sub-graphs and each sub-graph is dealt with separately. In particular, only some larger sub-graphs selected by the exponent mechanism are modified, which further reduces the perturbation to the original graph. The presented method is proven to satisfy differential privacy. The performances of experiments demonstrate that this uncertain graph method can effectively provide a strict privacy guarantee and maintain data utility.

Study on Improvement for Information System Installation for e-Government's Internal Control through Legal Review : Focused on Barum e-System (전자정부의 내부통제를 위한 정보시스템 도입에 있어서 제도적 개선방안에 관한 연구 : 바름 e 시스템을 중심으로)

  • Lee, Dong Han;Lee, Ook
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.179-193
    • /
    • 2013
  • E-Government refers to government to use ICT (information and communications technology) to work more effectively, share information and deliver better services to the public. With ICT, e-Government has increased transparency of governments. However even there has been much trial for transparency, corruption has been growing with the form of e-corruption. While external threats such as hackers and viruses can have serious consequences, currently most crime involving emerging technology is carried out by insiders i.e. employees in the e-government. Among the many tools being developed to fight e-corruption, there has been much focus lately on internal control system. So, South Korea developed and test-operated "Barum e-system" for internal control last year. This research establishes legal basis, information system link and privacy policy for settlement of this information system through legal review.

A Study on Privacy Security in Maritime Information Gateway System (지능형 해상교통정보 연계시스템에서의 개인정보 보안에 관한 연구)

  • Yong-hak Song;Hyun Kim;Deuk-Jae Cho;Jong-Hwa Beak;Do-yeon Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.202-203
    • /
    • 2023
  • The Ministry of Oceans and Fisheries is providing maritime safety services through the operation of the Korean e-Navigation service, and research is continuously needed to improve reliability and quality to secure the competitiveness of the system. In order to secure such competitiveness, we presented the basic design for the big-data maritime information gateway system for minimizes thereal-time operation impact of the Korean e-Navigation service, and a theoretical hardware structure diagram including pseudonymization procedures to implement the overall system and solve privacy security issues. However, the proposed structure diagram and design include only the overall concept, to link real-time maritime information, required detailed privacy security method to satisfy the Privacy Act of the Republic of Korea. To solve this problem, this study will identify factors to violate the Privacy Act within the real-time maritime information(privacy of shipowner, shipping company, captain, navigator, fisherman, etc.) linked by the big-data maritime information gateway system, and research the method to link the secured information to other institutions by encrypting identified the factors.

  • PDF

A Method for Calculating Exposure Risks of Privacy Information based on Website Structures (웹사이트의 구조를 고려한 개인정보 노출 위험도 계산 기법)

  • Lee, Sue Kyoung;Son, Jin Sik;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.1
    • /
    • pp.1-14
    • /
    • 2016
  • This research proposes a method that aims to evaluate the risk levels of websites based on exposure risks of privacy information. The proposed method considers two aspects as follows. First, we define the risk levels of each privacy information according to its own inherent risk. Second, we calculate the visiting probability of a webpage to measure the expected of the actual exposure of privacy information on that webpage. In this research, we implemented an system to prove that automatically collects websites and calculates their risk levels. For the experiments, we used a real world dataset consisting of a total of websites for 4 categories such as university, bank, central government agency, and education. The experiment results show that the websites in the bank category are relatively well managed, while the others are needed to cope with the exposure of privacy information. Finally, the proposed method in this research is expected to be further utilized in establishing a priority-based approach to alleviate of the privacy information exposure problems.

The role of corporate image and privacy concerns in adopting online travel services

  • Tapanainen, Tommi;Nguyen, Thi Thanh Hai;Dao, Kien Trung
    • The Journal of Information Systems
    • /
    • v.28 no.3
    • /
    • pp.1-23
    • /
    • 2019
  • Purpose This study examines the role of corporate image and privacy concerns in intention to use of online travel services using data from Vietnam. Design/methodology/approach The data collection was implemented to a student sample at the Foreign Trade University in Hanoi, which has a high concentration of young people who are interested in online travel in Vietnam. The paper based questionnaire was directly delivered to the respondents. After sorting to eliminate unfit samples, the number of responses was 541, which exceeds 500, the minimum number typically required. To test the hypotheses, we applied structural equation modeling (SEM) and Confirmatory Factor Analysis (CFA) was used to evaluate the reliability and validity of constructs in the model. We also used direct, indirect and total effect coefficient to evaluate the total impact of factors on the intention to use online services. Findings This study found that corporate image is positively associated to intention to use online services. It found a link between corporate image and privacy concerns, which suggests another way for firms to address their customers' privacy concerns; corporate image, which has received great attention in traditional offline sales channels, but not in online services, should receive higher attention in IS research. Online travel businesses, besides increasing ease of use, perceived usefulness and trust in their services, should focus on build a reliable corporate image, which can not only promote the service use but also help to eliminate users' the privacy concerns.

Privacy Protection and RFID(Radio Frequency IDentification) (RFID와 프라이버시 보호)

  • Lee, Cheol-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.443-446
    • /
    • 2006
  • RFID is the core of realizing ubiquitous environment. This is expected to improve economical effect through related industry revitalization, make-work, and so on, in the future, and to be linked to social see-through enhancement via national life change. However unchecked RFID use lets retailers collect unprecedented huge information and they link it to customer information database, so the voice of worry to bring about a result of trampling down consumer privacy doesn't make a negligible situation. Although RFID system is spreaded out socially, the servicing of law and system is not accomplished to protect individuals from personal information violation threat. At the same time, in ubiquitous computing environment, to protect individual information efficiently, from the step of planning and deciding this technology system, constitutional law, norm, the basic legal rights of the people, and so forth is to be considered. The objective of the research is to persent the privacy protection from the viewpoints of law on RFID.

  • PDF

1 Person Media Based on Person Wide Web for Preventing Privacy Risk (사생활 침해 방지를 위한 Person Wide Web 기반 1인 미디어)

  • Yoon, Jisup;Ma, Jung-Mi;So, Sun-sup;Eun, Seongbae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.339-346
    • /
    • 2016
  • 1 person media is becoming the leading trend among several media in the Internet era exploiting the individual desire of showing off. But, the vast accessibility of Internet produces the worry about privacy risk, which concludes in the increasement of closed SNS. In this paper, we propose a system based on PWW (Person Wide Web) where a person is producing a media and share it with other persons. PWW is an information system which consists of a smart-phone, mobile anchors, a standard web document, and his own cloud storage. An information consumer gets the link using his smart-phone from the mobile anchors attached on the objects in the field. The web browser in the smart-phone obtains the web documents designated by the link and presents it. We also explains the 1 person media system based on PWW and presents the example utilized in the field. We compared and analyzed the security factor of the system based on between WWW and PWW, and concluded that PWW is better than WWW in the aspect of security.

A Study on Office Layouts focusing Concentration and Communication Behavior (업무집중 및 커뮤니케이션 행태를 중심으로 한 오피스 레이아웃 유형에 관한 연구)

  • Kim Doo-Na;Ha Mi-Kyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.13 no.6
    • /
    • pp.29-38
    • /
    • 2004
  • The purpose of this study is to provide design guidelines on office layouts to improve workers' concentration and communication behavior while supporting work processes. Among the present office types, benzene-type was preferred the most was providing better concentration. Regarding communication, link and benzene were preferred types. In present office types, workers were satisfied in communication more than concentration. To increase concentration level, acoustical privacy was indicated as the most important factor In conclusion, to support both concentration and communication in office, the team area should be divided into smaller sub-team areas. The sub-team areas may support interaction within a group while preventing unnecessary distraction. The major circulation of work process should be formed outside of the sub-team areas to provide concentration within the groups.

The Role and Issue analysis of the ADR's Committee in the Revision of Personal Information Protection Act (데이터 3법 개정에 따른 분쟁조정위원회 역할과 이슈분석)

  • Yoon, Duck Joong;Jee, Yoon Seok;Kim, Youngae;Shin, Yongtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.279-286
    • /
    • 2020
  • On February 4, 2020, the Personal Information Protection Act ("Privacy Act") was amended to facilitate the convergence and utilization of data, a key resource of the Fourth Industrial Revolution, and to support the development of the data industry. As the scope of the law applies to telecommunications operators, financial operators, and personal information processing providers, the scope of related dispute settlement is expected to increase. Therefore, this paper first introduces the role and function of the Personal Information Dispute Committee and the institutional standards for personal information dispute mediation, and researches the roles and issues that the Personal Information Dispute Mediation Committee should play in accordance with the revision of the Data 3 Law. In this study, For efficient operation of personal information dispute mediation, expert deliberation by field, new adjustment criteria for new industrial technologies, way to secure business continuity between the Personal Information Dispute Committee and the Personal Information Committee, Secure the link between the mediation decision and courts, and Suggested the strengthening of the operational standards for collective dispute mediation.

Evolving Internet Information & Technology as Enablers for Creating Shared Values

  • Song, In Kuk;Chun, Junchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.309-317
    • /
    • 2015
  • Recently many companies began to realize their visions for the sustainable growth with the advent of CSV(Creating Shared Values). Michael E. Porter, a Harvard Professor, claims that placing social value creation at the core of business strategy has the potential to uncover big opportunities for individual companies and that shared value can play a significant role in increasing competitive advantages while fostering social prosperity. In consequence, the various researches have illustrated how to get the opportunity for competitive advantages from building a social value proposition into corporate strategy, and considerable studies have been promoted heavily from the managerial perspective. However, due to the lack of capability converging information technology with business strategy, any research effort to identify technological or Internet-related issues and to link the issues to CSV does not exist. With Korean being a Internet leading country, the demands of researches analyzing core technology, information, and service utilizing Internet are rapidly growing. The study aims to find out Internet-related enablers for CSV. This paper describes the concepts and features of CSV, identifies emerging Internet-related issues toward the opportunity for competitive advantage, and then depicts the rigorous research endeavors in the areas of Internet information, technology, and services. As a result, 11 papers presented and selected as the outstanding papers at APIC-IST 2014 handle the issues to be brought together, which include: Wireless and Sensor Network, Image Processing and HCI, Big Data and Business Intelligence, Security & Privacy in Internet, SNS & Communication, Smart-Learning and e-Learning, and Internet Business Strategy. The study finally recommends indispensible terms for substantially vitalizing CSV.