DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kwon, Young Chul | ko |
dc.contributor.author | Lee, Sang Won | ko |
dc.contributor.author | Moon, Songchun | ko |
dc.date.accessioned | 2013-03-06T09:47:40Z | - |
dc.date.available | 2013-03-06T09:47:40Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2006 | - |
dc.identifier.citation | ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.4266, pp.76 - 87 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/86603 | - |
dc.description.abstract | In this paper, we introduce our own two-year experiments to acquire sensitive personal information from discarded hard disks which we had obtained with no ease in Korean second-hand PC markets. With careful scanning, we found that most of hard disks were not adequately cleaned, and had a plenty of confidential and sensitive personal data, which could be utilized in crimes like identity theft. Collected private data, analyzed based on the concept of identifiable individual, amounted to 4,526 persons worth of data, including 3,584 resident registration numbers. The result also indicated that discovered data items of each person were revealed to display a wide spectrum of sensitivity level. | - |
dc.language | English | - |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.title | Personal computer privacy: Analysis for Korean PC users | - |
dc.type | Article | - |
dc.identifier.wosid | 000241630900006 | - |
dc.identifier.scopusid | 2-s2.0-33845271451 | - |
dc.type.rims | ART | - |
dc.citation.volume | 4266 | - |
dc.citation.beginningpage | 76 | - |
dc.citation.endingpage | 87 | - |
dc.citation.publicationname | ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.contributor.localauthor | Moon, Songchun | - |
dc.contributor.nonIdAuthor | Kwon, Young Chul | - |
dc.contributor.nonIdAuthor | Lee, Sang Won | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordAuthor | privacy | - |
dc.subject.keywordAuthor | data forensics | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.