Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Jae Kyu-
dc.contributor.authorChang, Younghoon-
dc.contributor.authorKwon, Hun Yeong-
dc.contributor.authorKim, Beopyeon-
dc.date.accessioned2021-12-10T04:18:53Z-
dc.date.available2021-12-10T04:18:53Z-
dc.date.created2021-08-30-
dc.date.issued2020-02-
dc.identifier.issn1387-3326-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/130718-
dc.description.abstractThe emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of cybercrime threats is becoming an increasingly necessary complement to the current self-defensive cybersecurity systems. One concern associated with adopting such preventive measures is the risk of privacy infringement. Therefore, it is necessary to design the future Internet infrastructure so that it can appropriately balance preventive cybersecurity measures with privacy protections. This research proposes to design the Internet infrastructure using the preventive cybersecurity measures of the Bright Internet, namely preventive cybersecurity protocol and identifiable anonymity protocol, and ten privacy rights derived from Europe's General Data Protection Regulations (GDPR). We then analyze the legitimacy of the five steps of the preventive cybersecurity protocol and the four features of the identifiable anonymity protocol from the perspectives of ten privacy rights. We address the legitimacy from the perspective of potential victims' self-defense rights. Finally, we discuss four potential risks that may occur to the innocent senders and proposed resilient recovery procedures.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectINFORMATION SECURITY BEHAVIORS-
dc.subjectEMPIRICAL-EXAMINATION-
dc.subjectCHALLENGES-
dc.subjectPOLICIES-
dc.subjectIMPACT-
dc.subjectCARE-
dc.titleReconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach-
dc.typeArticle-
dc.contributor.affiliatedAuthorKwon, Hun Yeong-
dc.identifier.doi10.1007/s10796-020-09984-5-
dc.identifier.scopusid2-s2.0-85078125363-
dc.identifier.wosid000519616500007-
dc.identifier.bibliographicCitationINFORMATION SYSTEMS FRONTIERS, v.22, no.1, pp.45 - 57-
dc.relation.isPartOfINFORMATION SYSTEMS FRONTIERS-
dc.citation.titleINFORMATION SYSTEMS FRONTIERS-
dc.citation.volume22-
dc.citation.number1-
dc.citation.startPage45-
dc.citation.endPage57-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusINFORMATION SECURITY BEHAVIORS-
dc.subject.keywordPlusEMPIRICAL-EXAMINATION-
dc.subject.keywordPlusCHALLENGES-
dc.subject.keywordPlusPOLICIES-
dc.subject.keywordPlusIMPACT-
dc.subject.keywordPlusCARE-
dc.subject.keywordAuthorBright internet-
dc.subject.keywordAuthorPrivacy rights-
dc.subject.keywordAuthorGDPR-
dc.subject.keywordAuthorPreventive cybersecurity protocol-
dc.subject.keywordAuthorIdentifiable anonymity protocol-
dc.subject.keywordAuthorSelf-defense rights-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE