• Title/Summary/Keyword: 개인정보보호 정책

Search Result 389, Processing Time 0.035 seconds

A Study on the Effects of University Students' Personal Information Protection Awareness on Information Security Attitudes: Information Security, Personal Information Infringement, Personal Experience, Information Security Intent Multi-Mediation Effect Analysis (대학생의 개인정보보호 인식이 정보보안 태도 미치는 영향연구: 정보보안, 개인정보침해, 개인적 경험, 정보보안 의도 다중매개효과분석)

  • Yun, Il-Hyun
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.125-132
    • /
    • 2021
  • This study analyzed the multi-mediating effects of information security, personal information infringement, personal experience, and information security intention in the relationship between personal information protection and information security attitude. For this purpose, a survey was conducted on 221 students from G University. First, information security, personal information infringement, and information security awareness had a simple mediating effect. Second, information security, personal information infringement, personal experience, and information security consciousness had parallel multi- mediation effects. Third, personal information infringement and information security awareness had a simple mediating effect in the parallel multiple mediation state. Fourth, information security had a simple mediating effect, but it was found that there was no simple mediating effect in the parallel multiple mediation state. This study is meaningful in that it empirically compared the simple and multi-mediation effects.

The SME Informatization Level Analysis and Design for Privacy (개인정보보호를 고려한 중소기업 정보화 수준 분석 설계)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.121-126
    • /
    • 2015
  • SME informatization level analysis is significant as an indicator for analyzing the performance and competitiveness of enterprises. However, as has recently been highlighted, the importance of privacy recognized as infrastructure, and mindset are very important indicators for security and privacy. Therefore, In this study, analysis of SMEs at the informatization level, with a focus on how we can assess whether the privacy-related activities were carried out.

A Study for Personal Information Security in Ubiquitous City Life (유비 쿼터스 도시에서의 개인정보 보호방안에 관한 연구)

  • Jeong, Woo-Young;Shin, Dong-Bin;Kim, Jung-Hoon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.293-296
    • /
    • 2008
  • 유비쿼터스도시는 기반시설을 지능화하여 효율적으로 도시를 관리하고, 다양한 정보의 융합을 통한 첨단 도시서비스를 제공하는 새로운 개념의 생활공간이다. 유비쿼터스도시에서 활용하는 유비쿼터스정보기술은 언제, 어디서나 편리하게 유용한 정보를 제공하는 이점이 있다. 그러나 첨단화된 컴퓨팅 기술로 말미암아 도시민들이 인식하지 못하는 사이에 정보의 유통 활용이 이루어짐으로써, 다양한 정보를 어떻게 보호할 것인지에 대한 문제가 이슈로 대두되고 있다. 또한 유비쿼터스도시 통합운영센터로의 정보 집중으로 인한 정보유출 또는 정보침해 방지 대책이 주요 이슈로 등장하게 되었다. 본 연구에서는 개인정보의 유출에 대한 원인을 다각도에서 분석하였다. '유비쿼터스도시 정보보호 기반조성'이라는 기본방향 아래 '개인정보보호를 통한 삶의 질 향상'을 목표로 하였다. '정보보호를 위한 체계 수립', '유비쿼터스사회에 대비한 정보보호 기반 조성', '정보보호 모델개발 및 지원', '시민이 참여하는 정책수립'을 추진전략으로 수립하였으며 이를 실천하기 위한 주요 추진과제들을 제시하였다.

  • PDF

A Study of Student Nurses' Knowledge, Awareness and Performance of Patients' Personal Information Protection (간호대학생의 환자 개인정보보호에 대한 지식, 인식 및 실천정도)

  • Ahn, Sung Mi
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.337-345
    • /
    • 2020
  • The Study was conducted to understand the degree of knowledge, awareness and performance of nursing students' patients' personal information protection and to grasp the relationship between them. A convenience sample 262 nursing students was selected from C do, between 1 November and 8 November 2019. Using SPSS Program t-test, one-way ANOVA, Pearson's correlation analysis were performed. Factors that influenced knowledge, awareness and performance included grade, education of information. It is necessary to develop and test programs to ensure an improvement in knowledge and awareness among nursing students to increase their performance.

Attorney's Duty to Protect Personal Information (변호사의 개인정보 보호의무)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.1-10
    • /
    • 2014
  • In February 2014 Korean Bar Association has amended Professional Ethics Code as to stipulate attorney's duty to protect personal information. While existing Korean law and Professional Ethics Code has made attorney to keep client's confidential information, attorney's newly promulgated obligation has its meaning in that personal information of subject other than client is not protected through confidentiality rules, given that confidentiality obligation is interpreted to protect only client's information relating to representation. Moreover, duty to protect personal information deals with not only disclosure and use of information, which confidentiality rules is about, but also collection and retention process, access to and correction and care of information and even destruction of information. Amid unprecedented theft of personal data in several national banks and other serious leakage reported recently, this paper is going to contemplate the scope and application of the duty to protect personal information with hope to contribute to starting discussion on it.

Privacy Protection for Internet-Based Real-Time Admission Application System (인터넷 입학원서 접수 시스템의 개인정보보호)

  • Jung, Kap-Kyu;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1453-1456
    • /
    • 2009
  • 본 논문에서는 인터넷 상에 공개된 정보를 기반으로 대부분 대학에서 대행업체에 위탁하고 있는 인터넷 원서접수 업무에 있어서 개인정보보호 문제점을 다룬다. 개인정보보호와 관련된 정책, 시스템 검토, 개인정보 흐름 분석, 개인정보침해요인 분석과 위험평가 및 개선 계획 도출 등 일련의 프로세스 관점에서 개인정보영향평가를 모의 수행함으로써 동 시스템이 가지고 있는 개인정보 관련 문제점 및 개선 방안을 도출한다.

A Study on the Possibility of Self-Correction in the Market for Protecting Internet Privacy (인터넷 개인정보보호의 시장자체해결가능성에 대한 연구)

  • Chung, Sukkyun
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.27-37
    • /
    • 2012
  • Internet privacy has become a significant issue in recent years in light of the sharp increase in internet-based social and economic activities. The technology which collects, processes and disseminates personal information is improving significantly and the demand for personal information is rising given its inherent value in regard to targeted marketing and customized services. The high value placed on personal information has turned it into a commodity with economic worth which can be transacted in the marketplace. Therefore, it is strongly required to approach the issue of privacy from economic perspective in addition to the prevailing approaches. This article analyzes the behaviors of consumers and firms in gathering personal information, and shielding it from unauthorized access, using a game theory framework in which players strive to do their best under the given conditions. The analysis shows that there exist no market forces which require all firms to respect consumer privacy, and that government intervention in the form of a nudging incentive for information sharing and/or strict regulation is necessary.

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

A Study on the i-PIN Policy Implementation Process for the i-PIN Revitalization (i-PIN의 활성화를 위한 정책집행 과정 분석)

  • Kim, Min Chen;Song, Keun Won;Chung, Choong Sik
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.43-62
    • /
    • 2010
  • Mandatory use of resident registration number in Korean websites is likely to result in an violation of privacy. The Korea government introduced i-PIN (Internet Personal Identification Number) to solve this problem in Oct of 2006. But the implementation of i-PIN has failed to decrease violation of privacy. Therefore, we must open our eyes to problems of i-PIN and the importance of privacy protection. This study analyzes the policy failures of i-PIN and considers countermeasures for protecting privacy on the Internet, and explores policy alternatives to secure privacy on the Internet by analyzing the implementation process of I-PIN. In conclusion, this study stresses the urgent need for a well-thought-out policy in order to solve the problems of i-PIN on the Internet. It expects that the i-PIN will make a big stride for the realization of secure electronic government.

  • PDF

Applied to Privacy Information Access Control Mechanism in Ubiquitous Environments (유비쿼터스 환경내의 개인정보 접근통제 메커니즘 작용 방안)

  • Hong Seng-Phil;Jang Hyun-Me
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.627-630
    • /
    • 2006
  • 정보사회에서 인터넷을 기반으로 한 IT관련 기술의 빠른 증가와 더불어 유비쿼터스 환경의 연구 또한 점점 가시화 되어 지고 있다. 이와 더불어, 웹 기반의 분산 컴퓨팅 환경 내에서 관련 정보들의 수집, 보관, 공유, 이동이 활발해지면서, 개인정보의 불법적 유출, 남용에 따른 사생활 침해문제를 해결하기 위한 방안에 관심이 집중되고 있다. 이에 본 논문에서는 유비쿼터스 환경 내에서의 신뢰할 수 있는 개인정보 아키텍처를 구현하기 위한 3단계의 개인정보 보호 메커니즘/통합사용자 인증 메커니즘 CAM(Consolidated Authentication Mechanism), 개인정보정책 메커니즘 PPM(Privacy Policy Mechanism), 개인정보 통제 메커니즘 OCM(Output Control Mechanism)을 제시하였다. 또한 사용자에게 개인정보 사용시 정보의 중요도에 따른 "알림(Notice)" 기능을 웹 브라우저 내 개인정보 적용 기술(P3P)과 연동하여 제공하고, 접근 제어하는 기술적 적용 방안을 소개함으로써 개인 정보의 연동시 오 남용 방지 방안과 시스템 환경 내 실용 가능성(feasibility)을 소개하였다.

  • PDF