Browse > Article
http://dx.doi.org/10.13067/JKIECS.2018.13.3.601

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection  

Seo, Woo-Seok (Security Consulting, Gyeonggi-do R&D laboratory)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.13, no.3, 2018 , pp. 601-608 More about this Journal
Abstract
While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.
Keywords
Information Security; Interconnection; Integration; Personal Information Security; Policy; Safety Secure;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 C. Choi, Y. Lee, and T. Lee, "Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 11, 2016, pp. 1017-1024.   DOI
2 S. Park and N. Kim, "A Verification Case Study about the Authentication of a Network using AAA," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 2, 2017, pp. 295-300.   DOI
3 J. Jeong and M. Choi, "A Study on Awareness of Information Security Influencing Trustness," J. of the Korean Institute of Information Security and Cryptology, vol. 25, no. 5, 2015, pp. 1225-1233.   DOI
4 M. Yim, "Why Security Awareness Education is not Effective?," J. of Digital Convergence, vol. 12, no. 2, 2014, pp. 27-37.   DOI
5 J. Jang, C. Choi, and D. Kim, "Design of Smart Tourism in Big Data," J. of the Korea Institute of Electronic Communication Sciences, vol. 12, no. 4, 2017, pp. 637-644.   DOI
6 J. Kim, "A Mobile-Sink based Energy-efficient Clustering Scheme in Mobile Wireless Sensor Networks," J. of Korea Academia-Industrial Cooperation Society, vol. 18, no. 5, 2017, pp. 1-9.   DOI
7 B. Cha, J. Kim, and S. Park, "Prototype Design of Hornet Cloud using Virtual Honeypot Technique," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 8, 2015, pp. 891-900.   DOI
8 J. Bae and O. Park, "A case analysis on the effects of HRM on innovative performance," J. of Korea Academy of Organization and Management, vol. 30, no. 1, 2006, pp. 177-209.
9 J. Kim, S. Kim, and S. Ryu, "The Impact of HR Involvement on HR Effectiveness," J. of Korea Academy of Management, vol. 12, no. 3, 2004, pp. 127-161.
10 J. Jang, D. Kim, and C. Choi, "Study on Hybrid Type Cloud System," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 6, 2016, pp. 611-618.   DOI