Browse > Article
http://dx.doi.org/10.14257/jse.2016.04.08

A Study on Personal Information Protection Guideline : Through Research Case Study Analysis in Internet of Things Environment  

Kim, Hye Ri (Department of Computer Science, Seongshin Women's Univ.)
Hong, Seng-phil (School of Information Technology, Seongshin Women's Univ.)
Park, Su Min (Department of Computer Science, Seongshin Women's Univ.)
Publication Information
Journal of Security Engineering / v.13, no.2, 2016 , pp. 155-168 More about this Journal
Abstract
Internet of Things(IoT) is being globally spotlighted as a fundamental technology to realize hyper-connected society, and as new growth engines. IoT is formed an intelligent connection in a mutually cooperative intelligence relationship between 'things' without human intervention. Although IoT provides new value to user in the domain of home, home appliance, medical, transportation sector which is familiar with our living, the security threats in cyber space could spread real space because entire 'things' are connected. In this paper, we analyze the legal and technical privacy issues that may occur in the IoT environment and proposes the privacy guidelines accordingly.
Keywords
IoT(Internet of Things); Privacy; Personal Information Protection; IT Compliance;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Jeong, H. and Lee, D.H., The evolution of the Internet of Things and Policy Suggestions, KISDI Premium Report (2014)
2 J.H.Lee., IoT Security Issues and Implications, ICT Spot Issue, (2015) 07, IITP, pp.15-24
3 Opinion 8/2014 on the on Recent Developments on the Internet of Things(WP29), http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp223_en.pdf, Sep (2014)
4 https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf, Jan (2015)
5 Ministry of Science, ICT and Future Planning, http://www.msip.go.kr (2015)
6 Kyoung-Sik Min, Global Trends on privacy in the IoT environment, IITP Weekly ICT Issue, (2015), Vol.1700, pp.12-23.
7 Jeong junhyeon, Kwon Ohmin, "A Strudy of Legal Issue Collection-Processing-Third party Providing of Personal Data and Their Value Adding", Hongik Law Review (2015), Vol. 16, No.1,pp.937-960   DOI
8 Woo-Joon JEONG, "A Study on Legal and Institutional Improvement Measures to Promote the Internet of Things", The Korea Law Professors Association (2014), Vol14, No.4,pp.1835-1867
9 Bong-Im Jang, Chang-Su Kim, A study on the Security Technology for the Internet of Things, Journal of Security Engineering, (2014), Vol.11, No.5, pp.429-438.   DOI
10 Israa Alqassem, Privacy and Security Requirements Framework for the Internet of Things. Companion Proceedings of the 36th International Conference on Software Engineering, (2014), July 4; Hyderabad, India
11 Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiupyng Shieh, Emerging Security Threats and Countermeasures in IoT. ASIA CCS '15 Proceedings of the 10th ACM Symposium on Information, Computer and communications Security, (2015), April 14-17; Singapore
12 Jun Jung Hun, Security Technology, Threats and Trends in the Internet of Things, Convergence Security Journal, (2014), Vol.14, No.7, pp.4-12.
13 ENISA(European Union Agency for Network and Information Security), "Privacy and Data Protection by Design-from policy ro engineering" (2014)
14 Ministry of Science, Internet of Things Information Security Roadmap implementation plan for three years, http://www.msip.go.kr (2015)
15 Naver privacy column, http://privacyblog.naver.com/220427876061 (2015)