• Title/Summary/Keyword: 개인적 항목

Search Result 479, Processing Time 0.021 seconds

A case study of Privacy Impact Assessment -Focus on K hospital Privacy impact assessment case- (개인정보 영향평가 사례 연구 -K병원의 영향평가 사례를 중심으로-)

  • Jeon, Dong-Jin;Jeong, Jin-Hong
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.149-157
    • /
    • 2012
  • Recently, many corporations and public institutions are busy preparing and providing measures in dealing with new privacy information law. This study reviews privacy impact assessments in order to perform preventing and diagnosis against potential threats focus on the K-hospital case. The quality of protection in K-hospital shows that the corporations itself is 79.0, the system is 97.0, the life cycle of the privacy is 67.4 and CCTV is 90.0. The lowest levels are saving and keeping 50.0, usage and offer 64.1 and destruction 66.7 among the life cycle of the privacy. The result of risk analysis shows that the highest levels are controlling for privacy 11.0, saving and keeping 12.5 and destruction 13.0. From the result, dangerous duplications are saving and keeping and destructions.

A case study of Privacy Impact Assessment for C-Shopping Mall (C쇼핑몰 개인정보 영향평가 사례연구)

  • Jeon, Dong-Jin;Jeong, Jin-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.73-82
    • /
    • 2012
  • This paper reviews Privacy Impact Assessments in order to perform preventing and diagnosis against potential threats focused on the C-Shopping mall case. The quality of protection in C-shopping mall shows that the corporations itself is 29.2, the system is 68.8, the life cycle of the privacy is 25.5 and CCTV is 60.0. The lowest levels are the corporation's management 16.7, the life-cycle's saving and keeping 12.5, usage and offer 11.5 and destruction 16.7 among the life cycle of the privacy. The result of risk analysis shows that the highest levels are saving and keeping 13.3 and destruction 13.0. From the result, dangerous duplications are saving and keeping and destructions.

A Personalization Technology Based on Neural Networks (신경망에 기반한 개인화 기술)

  • 김종수;도영아;류정우;김명원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10b
    • /
    • pp.28-30
    • /
    • 2001
  • 현 인터넷상에서 취향에 맞는 항목(상품) 정보를 사용자에게 추천해 주는 개인화 기술은 대부분 특정 사용자와 유사한 선호도를 갖는 다른 사용자들의 특정 항목에 대한 선호도를 바탕으로 항목의 선호도를 추정하는 협력적 추천 기술을 적용하고 있다. 이중 최근접 이웃 방법은 적용하기가 용이한 반면 항목간의 가중치를 고려하지 못함으로써 추천의 정확도가 크게 떨어지는 문제점이 있다. 연관규칙 방법은 다른 항목에 대한 선호도 자료로부터 데이터 마이닝 기법을 적용하여 항목 선호에 대한 연관규칙을 추출하고 그 규칙을 사용하여 어떤 항목의 선호도를 추정한다. 따라서 항목들 간의 중요도가 연관규칙의 지지도나 신뢰도 등으로 나타난다고 할 수 있으나, 단순히 항목들간의 연관관계 즉 표면적인 연관관계에 의하여 선호도를 결정함으로써 항목들간의 어떤 내용적인 공통성 또는 어떤 상위개념에 의한 선호도가 고려되지 않음으로써 역시 정확도가 떨어지는 문제점이 있다. 본 논문에서는 추천의 정확도를 향상시키기 위한 신경망 추천 방법에 대해 분석하고, 내용기반 추천과 협력적 추천을 병합한 신경망 추천 방법을 제안한다. 또한, 다른 협력적 추천 방법과의 비교를 통하여 본 추천 방법의 장점과 성능의 우수함을 보인다.

  • PDF

Research on Framework and Inspection Method to Strengthen Personal Information Protection of Trustees (수탁사 개인정보보호 강화를 위한 프레임워크 및 점검방법 연구)

  • Yurim Bak;Yongtae Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.329-336
    • /
    • 2023
  • This paper analyzes the Personal Information Protection Act and related legal guides revised in 2023, proposes a framework for a consignment contract through the items necessary in the consignment relationship for personal information work, and inspects the status of personal information protection for consignees that are absent in Korea. By proposing common items that must be included, we prevent the occurrence of personal information leakage incidents by strengthening the basic personal information protection capabilities of trustees handling personal information work and alleviating the burden of essential personal information protection inspections. I want to do it.

The Audit Method for Private Location Information based on Location Services (위치서비스에 기반한 개인위치정보에 대한 감리방법)

  • Seo, Jung-Ho;Seo, Hee-Myung;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.251-266
    • /
    • 2012
  • Location Information is an information about a place where an individual exists or had existed. As smart phones are popularized, location information becomes more than simple information about the place. As a result, services using an individual's location information became the trend. However, problems arising from discharging Private Information can damage an individual, because it causes financial and economic loss but also detects individual's location and route directly. In realities, the guide that regulates Location Based Service for administering Private Location Information is insufficient. Therefore, this paper proposes check items, which contain standards of judicial action, financial loss ratings, importance of Private Location Information, and criticality of check lists, during the Private Location Information audit at the level of analysis, design, and management of the Information System, in order to prevent the infringement and disclosure of the Private Location Information. Moreover, the proposed check items were verified for its suitability by the professionals' survey.

Effect of Experimental Paradigms on Reaction Time-based Concealed Information Test (반응시간기반 숨긴정보검사에 대한 실험 패러다임의 효과)

  • Eom, Jin-Sup
    • Science of Emotion and Sensibility
    • /
    • v.24 no.2
    • /
    • pp.3-12
    • /
    • 2021
  • Most researchers have experimentally evaluated the detection efficiency of reaction time-based concealed information tests (RT CIT). In experimental studies, two experimental paradigms have been mainly used to create a lying situation, mock-crime paradigm and personal-item paradigm. This study is aimed at testing the detection efficiency of RT CIT for the one that could be estimated as the same as the other, regardless of the experimental paradigms. In study 1, it was tested whether the effect size of RT CIT was different in the two experimental paradigms through meta-analysis. As a result of the meta-analysis of 39 studies, the effect size (Hedges'g = 1.330) of the mock-crime paradigm was slightly larger than that (Hedges'g = 1.145) of the personal-item paradigm, but no statistically significant difference was found. Study 2 was an experimental study using both the mock-crime and personal-item paradigms, it was conducted to determine whether the detection efficiency of RT CIT differs in the two experimental paradigms. As a result of ANOVA, it was found that the RT differences between the probe and irrelevant stimuli were not significant in the two experimental paradigms. In the experimental study, the effect size (Cohen's d) of the mock-crime and personal-item paradigms were 1.638 and 1.535, respectively. In the discussion section, the reason of the detection efficiency of RT CIT not affected by the experimental paradigms was discussed.

Development of a Measurement Model of Personal Information Competency in Information Environment (정보 환경하에서 개인정보역량 측정모형 개발에 관한 연구)

  • Yoon, Chui-Young
    • The KIPS Transactions:PartD
    • /
    • v.14D no.1 s.111
    • /
    • pp.131-138
    • /
    • 2007
  • This study developed an efficient model for measuring personal information competency in an enterprise of the information environment. This model includes four measurement domains, twelve factors and feasible measurement items. This verified the validity and reliability of the developed model by factor analysis and reliability analysis through a pilot test with the application of SPSS software, and presented the concrete measurement items that tn efficiently gauge personal information competency. The developed model was applied to the measurement of 264 workers in an enterprise in order to testify its practicability and utilization, and the measurement results were presented. This model will contribute to improving the information competency of human resources in industrial fields.

Development of Privacy Impact Assessment Tool (개인정보 영향평가 툴 개발)

  • Heo, Jin-Man;Woo, Chang-Woo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.75-81
    • /
    • 2012
  • As the number of web users is increasing, the leakage of personal information is increasing. If some personal information is leaked, the victim can suffer from material damage or mental damage at the same time. Most of the leakages are result from the people who works for the personal information by accident or design. Hence, the Ministry of Public Administration and Security proposeed the measuring index and enumerates the details. The index is used in a system to check protection of a personal information. However, because this system is used to evaluate after the leakage, it cannot be used to construct some security system or programming a security system. To solve this problem, it needs to express the diversity of items and be able to count what assessors want to count. Thus, a summary sheet which displays the result of the tool will be presented in a radial form graph. Details will be presented as a bar graph. Therefore, it will be proposed that the tool can grasp the weak point and propose the direction of security.

  • PDF

개정 고시에 따른 개인정보보호 관리체계(PIMS)인증의 주요변화

  • Jeon, Jin-Hwan;Cho, Kangrae
    • Review of KIISC
    • /
    • v.23 no.5
    • /
    • pp.20-23
    • /
    • 2013
  • 방송통신위원회는 2011년부터 개인정보보호 관리체계(PIMS)를 시행하고, 심사를 통해 신청기업이 개인정보보호를 위해 일정수준 이상의 관리적 기술적 물리적 대책을 수립 및 운영하고 있을 경우 인증을 부여하고 있다. 이에 따라 이용자 및 정보주체는 해당 기관의 인증취득 여부를 통해 개인정보의 누출가능성을 최소화하고 효과적으로 보호하고 있음을 갈음하는 수단이 되고 있다. 본고에서는 개정 정보통신망법에 따라 지난 9월11일 방통위 의결을 통과한 개정 PIMS 고시에서의 주요하게 변화된 내용 중 민간인증기관 지정, 인증심사 항목의 개선에 대해 살펴보고, PIMS 인증을 준비 중인 기업의 이해를 돕고자 한다.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.