Abstract
Republic of Korea became the norm in the smartphone. Especially social networking services have been spread with a smartphone. With the increasing use of social network service, privacy violations are increasing. A study deals with the privacy and the right of forgotten. Particularly the right to be forgotten has emerged recently. So the right to be forgotten is still under discussion. This article recently appeared in the right to be forgotten case revolves. According to the development of new and emerging security issues are also analyzed together. This article further expands the area of privacy and security policies and technologies are expected to be used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
socialmediatoday, http://socialmediatoday.com/steve-olenski/280649/you-have-right-be-forgotten-online
dongA newspaper (2011), http://news.donga.com/3/all/20110208/34642846/1
Parent, W.A.: Rechnt work on the concept of privacy. American Philosophical Quarterly 20(4), 341 (2011)
beaglescout, http://www.news.unifiedpatriots.com/2011/03/18/eu-creates-a-bizarre-right-to-be-forgotten/
Wikipedia, http://en.wikipedia.org/wiki/Privacy
PSFK, http://www.psfk.com/2011/05/the-right-to-be-forgotten-questioning-the-nature-of-online-privacy.html
lobby nomics, http://www.lobbynomics.com/2010/11/my-right-to-be-forgotten-your-obligation-to-forget/
Waterfield, B.: http://www.theage.com.au/digital-life/digital-life-news/eu-push-for-online-right-to-be-forgotten-20101105-17hht.html
utopianist, http://utopianist.com/wp-content/uploads/2011/03/privacy-chart.jpg
archiebrain, http://archiebrain.com/blog/attach/1/1135150647.jpg
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, JM., Song, YJ., Cha, JS., Lee, SH. (2011). A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment. In: Kim, Th., Adeli, H., Robles, R.J., Balitanas, M. (eds) Information Security and Assurance. ISA 2011. Communications in Computer and Information Science, vol 200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23141-4_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-23141-4_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23140-7
Online ISBN: 978-3-642-23141-4
eBook Packages: Computer ScienceComputer Science (R0)