Browse > Article

A Study on Priority Rankings of Actions Providing Personal Information Security  

Kim, Young Hee (서울과학기술대학교 IT정책전문대학원 산업정보시스템공학전공)
Kook, Kwang Ho (서울과학기술대학교 기술경영융합대학 글로벌융합산업공학과)
Publication Information
Abstract
With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.
Keywords
Personal Information Protection; KJ; AHP; Information Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 이창효, "집단의 의사결정론", 세종출판사, 2000
2 행정안전부, "2012년 국가정보화백서", 한국정보화진흥원, pp. 407-408, 2012
3 Service Design Platform, http://www.servicedes ignplatform.com/
4 김영섭, "개인정보보호 수준 평가지표 개발에 관한 연구", 석사학위논문, 전남대학교, 2008
5 행정안전부, "개인정보의 안전성 확보조치 기준", 행정안전부고시 제43호, pp. 1-48, 2011
6 방송통신위원회, 한국정보보호진흥원. "개인정보의 기술적 관리적 보호조치 기준 해설서", 한국정보보호진흥원, 2009
7 이동녁, "개인정보보호를 위한 정보시스템 보안감사 방법에 관한 연구", 석사학위논문, 명지대학교, 2010
8 김정덕, "개인정보보호 거버넌스의 목표와 프로세스에 관한 연구", 한국정보보호학회지, 제21권 제5호, pp. 7-11. 2011
9 정태명, "사업자 개인정보보호수준 향상방안 연구", 한국CPO포럼, pp. 3-6, 2008
10 Domingo R. Tan, Personal Privacy in the Information Age: Comparison of Internet Data Protection Regulations in the United Stats and European Union, 21 Loy. L.A. Int'l & Comp. L. Rev. 661, 1999
11 행정안전부, "개인정보보호법"법률 제 11690호, 2011
12 Saaty T.L, "Decision making for leaders (AHP series, Vol.2)", RWS, 1995
13 Saaty,T.L, "The Analytic Hierarchy Process", New York : McGraw - Hill. International, 1980
14 Saaty,T.L,"Decision Makingwith Dependenceand Feedback:The Analytic Network Process", Int. J. ServicesSciences, Vol. 1, No.1, pp.83-98, 2008
15 이정현, "개인정보보호 강화를 위한 인터넷 개인인증 프레임 워크 개선모델 연구", 박사학위논문, 고려대학교, 서울, 2012