Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2017.7.3.083

An IPIMS Design for Efficient Personal Information Management  

Jeon, Byung-Jin (Department of Information Security, Tongmyong University)
Shin, Seung-Soo (Department of Information Security, Tongmyong University)
Lee, Jun-Yeon (School of Digital Media Engineering, Tongmyong University)
Publication Information
Journal of Convergence for Information Technology / v.7, no.3, 2017 , pp. 83-90 More about this Journal
Abstract
The purpose of this study is to solve the limitations that the information security manager of company should recognize the personal information of all employees. In this study, we propose efficient personal information retention status management system to minimize information retention status of personal information and department by information security manager and departmental information security officer. To do this, we study the method of transferring the check result from the PVA system to the efficient personal information retention management system, also study ways to minimize the amount of personal information we hold. It is possible to minimize the possession of personal information by changing the one channel method managed by the information security administrator of the existing PVA system to the two channel method so that the information security manager and the information security officer can manage it.
Keywords
Information Leakage; Privacy; IPIMS; Human Resource; DataBase;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 H. C. Kim, “A Study on the Destruction of the Personal Information,” The Journal of Comparative Private Law, Vol. 21, No. 3, pp. 1109-1138, 2014.
2 D. J. Cho, "The development of IT technology and protection of personal information," KOREAN LEGAL CENTER, The Justice 158-1, pp. 49-58, 2017.
3 S. B. Kim and B. M. Chang, “Design and Implementation of Privacy Impact Assessment Information System,” Journal of Korean Institute of Information Technology, Vol. 13, No. 6, pp. 87-104, 2015. DOI : 10.14801/jkiit.2015.13.6.87   DOI
4 D. K. Lee and J. I. Lim, “Forecast System for Security Incidents,” Journal of The Institute of Electronics and Information Engineers, Vol. 53, No. 6, pp. 69-79, 2016. DOI : 10.5573/ieie.2016.53.6.069   DOI
5 S. H. Bae, J. S. Shin, S. H. Chun and H. S. Chung, “A Study on Improving the Privacy for personal information collected for statistical processing,” Journal of Convergence Society for SMB, Vol. 6, No. 2, pp. 25-30, Jun. 2016. DOI : 10.22156/cs4smb.2016.6.2.025
6 H. J. Mun, Y. C. Hwang and H. Y Kim, “Countermeasure for Prevention and Detection against Attacks to SMB Information System – A Survey,” Journal of Convergence Society for SMB, Vol. 5, No. 2, pp. 1-6, Jun. 2015.
7 H. T. Chae and S. J. Lee, “Security Policy Proposals through PC Security Solution Log Analysis,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 24, No. 5, pp. 961-968, Oct. 2014. DOI : 10.13089/jkiisc.2014.24.5.961   DOI
8 S. K. Cho and M. S. Jun, “Privacy Leakage Monitoring System Design for Privacy Protection,” Journal of the Korea Institute of Information Security and Cryptology, Vol. 22, No. 1, pp. 99-106, Feb. 2012.
9 B. J. Jeon, D. B. Yoon and S. S. Shin, “Improved Integrated Monitoring System Design and Construction,” Journal of Convergence for Information Technology, Vol. 7, No. 1, pp. 25-33, Jan. 2017. DOI : 10.22156/cs4smb.2017.7.1.025   DOI
10 B. J. Jeon, D. B. Yoon and S. S. Shin, “Integrated Monitoring System using Log Data,” Journal of Convergence for Information Technology, Vol. 7, No. 1, pp. 35-42, Jan. 2017. DOI : 10,22156/CS4SMB.2017.7.1..035   DOI
11 M. S. Kim and D. W. Kang, "Information leakage prevention system design for small business," 2008.
12 J. Y. Lee and S. Y. Kang, “Design and Verification of the Integrated Log Analysis System for Enterprise Information Security,” Journal of Digital Contents Society, Vol. 9, No. 3, pp. 491-498, Sep. 2008.
13 K. S. Yu, S. H. Im and H. B. Kim, “Technology trend and development direction of integrated log management system,” Korea Institute Of Information Security And Cryptology, Vol. 23, No. 6, pp. 90-99, 2013.
14 B. G. Seo and D. H. Park, “Development on Early Warning System about Technology Leakage of Small and Medium Enterprises,” Journal of Intelligence and Information Systems, Vol. 23, No. 1, pp. 143-159, Mar. 2017.   DOI
15 S. J. Park and J. I. Llim, “A study on the development of SRI(Security Risk Indicator)-based monitoring system to prevent the leakage of personally identifiable information,” Journal of the Korea Institute of Information Security & Cryptology, Vol. 22, No. 3, pp. 637-644, Jun. 2012.