Digital Library


Search: "[ keyword: Leakage ]" (15)
    A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch
    , , , Vol. 33, No. 6, pp. 893-906, Dec. 2023
    JKIISC.2023.33.6.893

    Qualitative Study on the Leakage of Personal Information of Children through Ground Theory
    전창욱, 유진호, Vol. 30, No. 2, pp. 263-277, Apr. 2020
    10.13089/JKIISC.2020.30.2.263
    Keywords: Children Personal Information, Leakage, Ground Theory, qualitative Research, Children Personal Information, Leakage, Ground Theory, qualitative Research

    Mobile Application Privacy Leak Detection and Security Enhancement Research
    김성진, 허준범, Vol. 29, No. 1, pp. 195-203, Jan. 2019
    10.13089/JKIISC.2019.29.1.195
    Keywords: Mobile Application, Personal information leakage, Privacy, Security, Mobile Application, Personal information leakage, Privacy, Security

    Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment
    Kwang-jun Kim, Kyu-ho Hwang, In-kyoung Kim, Hyung-geun Oh, Man-hee Lee, Vol. 28, No. 2, pp. 449-456, Apr. 2018
    10.13089/JKIISC.2018.28.2.449
    Keywords: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage

    A Study on the Damage Cost Estimation Model for Personal Information Leakage in Korea
    Gyoo Gun Lim, Mei Na Liu, Jung Mi Lee, Vol. 28, No. 1, pp. 215-227, Feb. 2018
    10.13089/JKIISC.2018.28.1.215
    Keywords: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model

    Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing
    Dongyoung Koo, Vol. 27, No. 4, pp. 981-992, Aug. 2017
    10.13089/JKIISC.2017.27.4.981
    Keywords: side channel, Deduplication, hash tree, message size, Information leakage

    Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident
    Jae-Ha Eom, Min-Jeong Kim, Vol. 26, No. 2, pp. 463-474, Apr. 2016
    10.13089/JKIISC.2016.26.2.463
    Keywords: Personal information leakage, Stock Return, Valuation, Investors trading behavior and Performance

    A Study on the Stock Price Fluctuation of Information Security Companies in Personal Information Leakage
    Min-Jeong Kim, Namgil Heo, Jinho Yoo, Vol. 26, No. 1, pp. 275-284, Feb. 2016
    10.13089/JKIISC.2016.26.1.275
    Keywords: Personal information leakage, information security company, Stock price

    A method for quantitative measuring the degree of damage by personal information leakage
    Pyong Kim, Younho Lee, Timur Khudaybergenov, Vol. 25, No. 2, pp. 395-410, Apr. 2015
    10.13089/JKIISC.2015.25.2.395
    Keywords: Personal Information Exposure, quantitative measure for the risk by personal information leakage, Personal information security, security for SNS, Security

    Study on Security Grade Classification of Financial Company Documents
    Bu Il Kang, Seung Joo Kim, Vol. 24, No. 6, pp. 1319-1328, Dec. 2014
    10.13089/JKIISC.2014.24.6.1319
    Keywords: Personal Information, leakage of personal Information, Security grade classification of document