Digital Library
Search: "[ keyword: Leakage ]" (15)
Qualitative Study on the Leakage of Personal Information of Children through Ground Theory
전창욱,
유진호,
Vol. 30, No. 2, pp. 263-277,
Apr.
2020
10.13089/JKIISC.2020.30.2.263
Keywords: Children Personal Information, Leakage, Ground Theory, qualitative Research, Children Personal Information, Leakage, Ground Theory, qualitative Research
10.13089/JKIISC.2020.30.2.263
Keywords: Children Personal Information, Leakage, Ground Theory, qualitative Research, Children Personal Information, Leakage, Ground Theory, qualitative Research
Mobile Application Privacy Leak Detection and Security Enhancement Research
김성진,
허준범,
Vol. 29, No. 1, pp. 195-203,
Jan.
2019
10.13089/JKIISC.2019.29.1.195
Keywords: Mobile Application, Personal information leakage, Privacy, Security, Mobile Application, Personal information leakage, Privacy, Security
10.13089/JKIISC.2019.29.1.195
Keywords: Mobile Application, Personal information leakage, Privacy, Security, Mobile Application, Personal information leakage, Privacy, Security
Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment
Kwang-jun Kim,
Kyu-ho Hwang,
In-kyoung Kim,
Hyung-geun Oh,
Man-hee Lee,
Vol. 28, No. 2, pp. 449-456,
Apr.
2018
10.13089/JKIISC.2018.28.2.449
Keywords: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
10.13089/JKIISC.2018.28.2.449
Keywords: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
A Study on the Damage Cost Estimation Model for Personal Information Leakage in Korea
Gyoo Gun Lim,
Mei Na Liu,
Jung Mi Lee,
Vol. 28, No. 1, pp. 215-227,
Feb.
2018
10.13089/JKIISC.2018.28.1.215
Keywords: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model
10.13089/JKIISC.2018.28.1.215
Keywords: Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model, Cyber side-effect, Personal information leakage, Infringement of rights, cost calculation model
Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing
Dongyoung Koo,
Vol. 27, No. 4, pp. 981-992,
Aug.
2017
10.13089/JKIISC.2017.27.4.981
Keywords: side channel, Deduplication, hash tree, message size, Information leakage
10.13089/JKIISC.2017.27.4.981
Keywords: side channel, Deduplication, hash tree, message size, Information leakage
Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident
Jae-Ha Eom,
Min-Jeong Kim,
Vol. 26, No. 2, pp. 463-474,
Apr.
2016
10.13089/JKIISC.2016.26.2.463
Keywords: Personal information leakage, Stock Return, Valuation, Investors trading behavior and Performance
10.13089/JKIISC.2016.26.2.463
Keywords: Personal information leakage, Stock Return, Valuation, Investors trading behavior and Performance
A Study on the Stock Price Fluctuation of Information Security Companies in Personal Information Leakage
Min-Jeong Kim,
Namgil Heo,
Jinho Yoo,
Vol. 26, No. 1, pp. 275-284,
Feb.
2016
10.13089/JKIISC.2016.26.1.275
Keywords: Personal information leakage, information security company, Stock price
10.13089/JKIISC.2016.26.1.275
Keywords: Personal information leakage, information security company, Stock price
A method for quantitative measuring the degree of damage by personal information leakage
Pyong Kim,
Younho Lee,
Timur Khudaybergenov,
Vol. 25, No. 2, pp. 395-410,
Apr.
2015
10.13089/JKIISC.2015.25.2.395
Keywords: Personal Information Exposure, quantitative measure for the risk by personal information leakage, Personal information security, security for SNS, Security
10.13089/JKIISC.2015.25.2.395
Keywords: Personal Information Exposure, quantitative measure for the risk by personal information leakage, Personal information security, security for SNS, Security
Study on Security Grade Classification of Financial Company Documents
Bu Il Kang,
Seung Joo Kim,
Vol. 24, No. 6, pp. 1319-1328,
Dec.
2014
10.13089/JKIISC.2014.24.6.1319
Keywords: Personal Information, leakage of personal Information, Security grade classification of document
10.13089/JKIISC.2014.24.6.1319
Keywords: Personal Information, leakage of personal Information, Security grade classification of document