• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Privacy ]" (22)
  1. 11. Efficient dummy generation for protecting location privacy in location based services
    Tian-yuan Cai, Ji-hye Youn, Doo-hee Song, Kwang-jin Park, Vol. 18, No. 5, pp. 23-30, Oct. 2017
    10.7472/jksii.2017.18.5.23
    Keywords: cloaked region, dummy, K-anonymity, location protection, Privacy
  2. 12. VANET Privacy Assurance Architecture Design
    Su-min Park, Man-pyo Hong, Tae-shik Shon, Jin Kwak, Vol. 17, No. 6, pp. 81-92, Dec. 2016
    10.7472/jksii.2016.17.6.81
    Keywords: Cooperative Intelligent Transport Systems, Connected car, VANET, Privacy, Security
  3. 13. A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
    Younsung Choi, Oh-Geol Kwon, Dongho Won, Vol. 17, No. 2, pp. 77-86, Apr. 2016
    10.7472/jksii.2016.17.2.77
    Keywords: Internet cookie technology, Personal information security, Privacy, Right to be forgotten
  4. 14. A Study on the Organization and Authority of the Personal Information Protection Commission
  5. 15. AMV: A k-anonymization technique minimizing the cloaking region
    Doohee Song, Minjae Heo, Jongwon Sim, Sori Hwang, Moonbae Song, Kwangjin Park, Vol. 15, No. 6, pp. 9-14, Dec. 2014
    10.7472/jksii.2014.15.6.09
    Keywords: cloaking, k-anonymization, location based service, spatial data, Privacy
  6. 16. Analysis of the Facebook Profiles for Korean Users: Description and Determinants
    Mina Lee, Seungah Lee, Inhye Choi, Vol. 15, No. 2, pp. 73-86, Apr. 2014
    10.7472/jksii.2014.15.2.73
    Keywords: Facebook, Facebook profiles, Personal Information, privacy concern
  7. 17. A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory
    Chanouk Park, Sang-Woo Lee, Vol. 15, No. 2, pp. 59-72, Apr. 2014
    10.7472/jksii.2014.15.2.59
    Keywords: Privacy, Privacy protection behavior, protection motivation theory, Privacy Act
  8. 18. A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation
    Sechung Pang, Ilkyeun Ra, Yangwoo Kim, Vol. 13, No. 5, pp. 55-64, Oct. 2012
    10.7472/jksii.2012.13.5.55
    Keywords: Secret Sharing, Privacy Information, Cloud computing, Hadoop
  9. 19. Development of Framework for Trusted Financial Service in N-Screen Environment
    Kyong-Jin Kim, Dong-Su Seo, Seng-Phil Hong, Vol. 13, No. 3, pp. 127-0, Jun. 2012
    10.7472/jksii.2012.13.3.127
    Keywords: Framework, Financial services, Privacy, Security, Vulnerability
  10. 20. Explicating Factors explaining Self-Disclosure in the Usage of Micro-blog