• Title/Summary/Keyword: 개인정보관리모델

Search Result 349, Processing Time 0.031 seconds

Study on Digital Investigation Model for Privacy Acts in Korea (개인정보보호법 기반 디지털 포렌식 수사 모델 연구)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1212-1219
    • /
    • 2011
  • As recently Privacy Acts in Korea enforced in domestic companies' personal information management needs of a growing obligation for the safety measures and the right of personal information collection, use, limitations, management, and destroyed specifically for handling personal information. Such this regulations should be required technical and policy supports. Accordingly, for the enterprise incident has occurred, the personal information management system behave correctly operating to verify that the safety measures taken, and be determined by the specific preparation to be done. So the first, preparation phase corresponds to the upcoming digital forensic investigation model. On the other hand, the response team also carried these measures out correctly, it needs to be done to check the compliance of Privacy Act. Thus a digital forensics investigation model is strictly related with the implementation of the Privacy Acts and improve the coping strategies are needed. In this paper, we suggest a digital forensic investigation model corresponding to Privacy Act.

Knowledge as Marketing Message : Design and Analysis of Human-Reader Based Personal Experience Management Business Model (마케팅 메시지로서의 지식 : Human-Reader 기반의 개인 경험 관리 비즈니스 모델 설계 및 분석)

  • Jun, Jung-Ho;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.1
    • /
    • pp.17-43
    • /
    • 2010
  • This research considers the role of knowledge as marketing message, designs and analyses the personal experience management (PEM) business model using Human-Reader system. It is difficult to save and manage person's daily experience and relevant contents due to the lack of proper infrastructure and system. On the contrary, using Human-Reader infrastructure, person's experience and various relevant contents can be easily saved and managed because seamlessness between offline and online and the various devices that person can always carry along in ubiquitous environment. Since person can store and manage information, contents and advertisements through Human-Reader system and u-PEMS, marketing messages and advertisements do not have to be repetitive and stimulating. Instead, marketing messages and advertisements in Human-Reader environment should be granting values that can be saved and managed. We propose various scenarios, processes and its issues. And we analyze the expected value of RFID tag used on the proposed business model by so-called 'Tag Evaluation Model' and assess the assumptions that are basis of the proposed business model for evaluate the feasibility of the u-PEM business model.

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.

Personal Information Management Based on the Concept Lattice of Formal Concept Analysis (FCA 개념 망 기반 개인정보관리)

  • Kim, Mi-Hye
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.163-178
    • /
    • 2005
  • The ultimate objective of Personal Information Management (PIM) is to collect, handle and manage wanted information in a systematic way that enables individuals to search the information more easily and effectively, However, existing personal information management systems are usually based on a traditional hierarchical directory model for storing information, limiting effective organization and retrieval of information as well as providing less support in search by associative interrelationship between objects (documents) and their attributes, To improve these problems, in this paper we propose a personal information management model based on the concept lattice of Formal Concept Analysis (FCA) to easily build and maintain individuals' own information on the Web, The proposed system can overcome the limitations of the traditional hierarchy approach as well as supporting search of other useful information by the inter-relationships between objects and their attributes in the concept lattice of FCA beyond a narrow search.

  • PDF

개인정보 라이프사이클에 따른 프라이버시 보호 프레임워크

  • Song You-Jin;Lee Dong-Hyeok
    • Review of KIISC
    • /
    • v.16 no.4
    • /
    • pp.77-86
    • /
    • 2006
  • 향후의 유비쿼터스 사회(U-Society)는 정보화에 따른 여러가지 새로운 위험들이 나타나는 사회가 될 것이며, 개인정보 생성, 수집 등을 통해 개인정보 지식베이스 형성을 가능하게 하는 정보위험사회의 도래가 예상되고 있다. 따라서, 사용자의 상황에 맞게 적응적(Adaptive)이고 적시적(Just-In-Time)으로 개인정보보호 서비스 제공이 가능한 새로운 프레임워크 개발이 요구된다. 본 논문에서는 U-Society와 프라이버시 개념의 변화 과정을 검토하고, 개인정보 및 프라이버시 침해의 유형을 비교 분석한다. 아울러, 기존 프라이버시 보호 프레임워크 모델인 WASP 아키텍쳐와 IBM의 TPM 작동 과정과 주요 기능을 살펴보고 이에 따른 문제점을 지적한다. 또한, 개인정보보호 대책을 수립하기 위해 개인정보의 라이프사이클 관점에서 수집, 저장/관리, 이용/제공, 폐기의 4단계로 분석하고 개인정보 라이프사이클에 따른 프라이버시 보호 프레임워크 모델을 제시한다.

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

Implementation of Effective Personal Information Management System For Shopping Mall member management (쇼핑몰 회원 관리를 위한 효율적인 개인정보관리 시스템의 구현)

  • Lee, Kwang-Hyung
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.3
    • /
    • pp.11-18
    • /
    • 2002
  • It is important to maintain the integrity of the personal information stored duplicately in DBs on the internet sites and to reduce the inconvenience of the user's. So it is useful to develop the integrated-DB supporting the independence of the S/W. In this paper, we investigate the defect of the membership management system on the internet site. Based on the result, we model the personal information management system to manage the membership efficiently, and implement the integrated personal information management system, called IPIMS.

  • PDF

An Implementation of Unified Ontology Context Model for Efficient Wellness Management (효율적 웰니스 관리를 위한 통합 온톨로지 상황모델의 구현)

  • Jeong, Jang-Seop;Ki, Byung-Wook;Hong, Seung-Taek;Bang, Dae-Wook
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.152-155
    • /
    • 2011
  • 최근 사회생활의 다변화로 인한 개인의 질환을 예방하고 건강을 증진시키기 위한 개인 웰니스 관리는 현대 사회의 성인에게는 필수적인 자기 관리에 해당된다. 본 논문는 이러한 웰니스 관리에 적절한 상황 모델로써 상황 데이터를 추론할 수 있는 SWRL 상황규칙과 불확실성을 표현한 베이지안 네트워크를 포함한 통합 온톨로지 기반 상황모델을 제시하였다. 제안한 상황모델에 포함된 추론 규칙은 웰니스 관리에 필요한 상황 서비스를 수행하는 액션들을 정의한다. 즉 상황 온톨로지에 SWRL 규칙을 포함함으로써 주로 웹 시멘틱에 사용되고 있는 OWL 언어를 상황인식 분야의 지식 베이스 구축에도 적합하도록 하였다. 그리고 웰니스 관리를 위해 상황 온톨로지로 표현되는 원시 상황 데이터는 센서 부정확성, 또는 개인 판단기준 차이로 인해 불확실성을 포함하므로, 어떤 논리적 상황 데이터는 불확실성을 고려하여 추론되어야 하기 때문에 본 논문은 상황 온톨로지 및 SWRL 규칙과 함께 베이지안 네트워크를 함께 표현할 수 있게 하여 OWL 상황 온톨로지 기반 규칙 추론뿐만 아니라 확률 추론을 용이하게 하였다.

A Study on Personal Information Protection Management Assessment Method by DEA (DEA 모형을 이용한 개인정보보호 관리수준 평가방법에 대한 연구)

  • Jeong, Myeong-soo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.691-701
    • /
    • 2015
  • Recently, with the growing number of services using personal information, government offices' tasks have become more dependent to personal information. Various policies and systems have been made and managed for the safe use of personal information in the circumstances that inevitably require the use of personal information, but the personal information privacy incidents and their scale are on a constant increase. Thus, Korea has been implementing personal information protection management system since 2008 to examine whether public organizations observe the personal information protection act and to how well they manage the personal information, and to improve what is insufficient in the process. However, despite high scores of the outcomes of the system, questions about the effectiveness of the outcomes and about the actual manage level are being raised. Thus, this study seeks to analyze public organizations' activities to protect personal information and the effectiveness of their foundation efforts for them by using the DEA model, and to propose a new model to enhance the effectiveness of the outcomes of personal information protection management system by reflecting them into the outcomes of system, using the derived effectiveness.