Browse > Article
http://dx.doi.org/10.13089/JKIISC.2019.29.5.1117

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection  

Lee, Youngsang (Datastreams Corp.)
Park, Wonhwan (Chungnam National Universiry)
Shin, Dongsun (Datastreams Corp.)
Won, Yoojae (Chungnam National Universiry)
Abstract
Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.
Keywords
Personal Data Use and Protection; Data Governance; Data Governance Maturity Model;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sunil Soares, The IBM Data Governance Unified Process, MC Press, Sept. 2010.
2 Seok-Soo Kim, "A Case Study of Implementation Data Governance for Enterprise Architecture", Journal of Information Technology and Architecture, 8(3), pp. 255-265, Sept. 2011.
3 J. Ladley, DATA GOVERNANCE : How to Design, Deploy, and Sustain an Effective Data Governance Program, Morgan Kaufmann Press, 225 Wyman Street, Waltham, MA 02451, 2012.
4 Kim, Sunho and Lee, Changsoo, "A Master Data Quality Management Framework, Entrue Journal of Information Technology, 9(2), pp. 109-121, July 2010.
5 Choi, Wan Il, "Establishing Data Governance in the Publication and Use of Public Sector Information.", National Information Society Agency, pp. 319-323, 2011.
6 K.Wende, "A Model for Data Governance-Organising Accountabilities for the Quality Management", 18th Australian Conference on Information Systems, pp. 417-425, Dec. 2007.
7 Kyoung_Ae Jang and Woo-Je Kim, "A Level Evaluation Model for Data Governance", Journal of The Korean Operations Research and Management Science Society, 42(1). pp. 66-77, 2017.
8 Mark C. Paulk, Bill Curtis, M.B. Chrissis, and C.V. Weber, "Capability Maturity Model, Version 1.1", IEEE Software, Vol.10, no. 2 pp. 18-27 July 1993.   DOI
9 Mark C. Paulk, Bill Curtis, and M.B. Chrisis, "CMMI Guidlines for Process Integration and Product Improvement, Addison-Wesley Long Publishing Co., 2003
10 Y.J. Won, W.P.Park, J.Kwak, H.J.Kim, The 4th Industrial Revolution & Information Security, Chung Ram Press, Mapo-Seoul, 2018.
11 P. Voigt and A. von dem Busche, The EU General Data Protection Regulation, : A Practical Guide, Springer International Publishing, 2017.
12 Ministry of the Interior & Safety, KISA, Policy commentary for securing Personal Data safety, 2015.
13 Office for Government Policy Coordination, Ministry of the Interior and Safety ect. Guidelines for De-identification of personal data, 2016.
14 K.E. Emam, B. Malin, "Appendix B : Concepts and Methods for De-identifying Clinical Trial Data.", National Academy of Sciences, 2015.
15 Hwang Sooha and Kim Jeungduk, "A study on the goals and processes of privacy governance", Review of KIISC, 23(6), pp. 7-11, Aug. 2011,
16 G. Thomas, "The DGI Data Governance Framework", Data Governance Institute, Orlando, FL (USA), 2006.
17 Z. Panian, "Some Practical Experiences in Data Governance", World Academy of Science, Engineering Technology 62, pp. 939-946, 2010.