Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jae Kyu | - |
dc.contributor.author | Chang, Younghoon | - |
dc.contributor.author | Kwon, Hun Yeong | - |
dc.contributor.author | Kim, Beopyeon | - |
dc.date.accessioned | 2021-12-10T04:18:53Z | - |
dc.date.available | 2021-12-10T04:18:53Z | - |
dc.date.created | 2021-08-30 | - |
dc.date.issued | 2020-02 | - |
dc.identifier.issn | 1387-3326 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/130718 | - |
dc.description.abstract | The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of cybercrime threats is becoming an increasingly necessary complement to the current self-defensive cybersecurity systems. One concern associated with adopting such preventive measures is the risk of privacy infringement. Therefore, it is necessary to design the future Internet infrastructure so that it can appropriately balance preventive cybersecurity measures with privacy protections. This research proposes to design the Internet infrastructure using the preventive cybersecurity measures of the Bright Internet, namely preventive cybersecurity protocol and identifiable anonymity protocol, and ten privacy rights derived from Europe's General Data Protection Regulations (GDPR). We then analyze the legitimacy of the five steps of the preventive cybersecurity protocol and the four features of the identifiable anonymity protocol from the perspectives of ten privacy rights. We address the legitimacy from the perspective of potential victims' self-defense rights. Finally, we discuss four potential risks that may occur to the innocent senders and proposed resilient recovery procedures. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | INFORMATION SECURITY BEHAVIORS | - |
dc.subject | EMPIRICAL-EXAMINATION | - |
dc.subject | CHALLENGES | - |
dc.subject | POLICIES | - |
dc.subject | IMPACT | - |
dc.subject | CARE | - |
dc.title | Reconciliation of Privacy with Preventive Cybersecurity: The Bright Internet Approach | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kwon, Hun Yeong | - |
dc.identifier.doi | 10.1007/s10796-020-09984-5 | - |
dc.identifier.scopusid | 2-s2.0-85078125363 | - |
dc.identifier.wosid | 000519616500007 | - |
dc.identifier.bibliographicCitation | INFORMATION SYSTEMS FRONTIERS, v.22, no.1, pp.45 - 57 | - |
dc.relation.isPartOf | INFORMATION SYSTEMS FRONTIERS | - |
dc.citation.title | INFORMATION SYSTEMS FRONTIERS | - |
dc.citation.volume | 22 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 45 | - |
dc.citation.endPage | 57 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | INFORMATION SECURITY BEHAVIORS | - |
dc.subject.keywordPlus | EMPIRICAL-EXAMINATION | - |
dc.subject.keywordPlus | CHALLENGES | - |
dc.subject.keywordPlus | POLICIES | - |
dc.subject.keywordPlus | IMPACT | - |
dc.subject.keywordPlus | CARE | - |
dc.subject.keywordAuthor | Bright internet | - |
dc.subject.keywordAuthor | Privacy rights | - |
dc.subject.keywordAuthor | GDPR | - |
dc.subject.keywordAuthor | Preventive cybersecurity protocol | - |
dc.subject.keywordAuthor | Identifiable anonymity protocol | - |
dc.subject.keywordAuthor | Self-defense rights | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.