• Title/Summary/Keyword: 개인정보침해

Search Result 617, Processing Time 0.025 seconds

Analysis on the Impact of Knowledge of Personal Information Protection on Their Behaviors in Elementary School (초등학생의 개인정보보호에 관한 지식이 행동에 미치는 영향 분석)

  • Lee, Kyungchan;Kim, Jamee;Lee, Wongyu
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.3
    • /
    • pp.299-310
    • /
    • 2015
  • This study was conducted with the goal to identify the degree to which elementary school students' knowledge about personal information protection practices impacted their actual behavior with regard to privacy protection. To fulfill this goal, knowledge about personal information protection was set as (1) knowledge about concepts of personal information, (2) knowledge of the rights of information holders, (3) knowledge about the code of conduct for information protection, and (4) awareness of the value of personal information. As for students' behaviors to ensure their personal information protection those were set as their habits to comply with the personal in-formation protection code of conduct and their efforts to respond and recover from any personal information violation. This study was conducted targeting 510 elementary students. The degree of the students' knowledge and their behaviors was measured by first distributing a self-report survey to the students and then analyzing their responses. The results of the analysis revealed the following: First, it was found that there are no differences among the four factors of knowledge and behavior according to the status of their education. Second, the two factors that primarily affected their personal information protection behavior were found to be their awareness of the information protection code of conduct and awareness of the value of personal information. This study holds significance in that it makes suggestions as to how personal protection practices should be taught to public school students.

Design of a Privacy-based Confirmed Case Contact Notification System in the With-Corona Era (With-Corona 시대에 프라이버시 보호 기반의 확진자 접촉 여부 알림 시스템 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.138-143
    • /
    • 2021
  • As of this moment, we are tracing people who are closed contact with Covid-19 patients and trying to block the spread of Covid-19 through diagnostic tests. However, the incubation period of the confirmed case is two weeks, and it takes a lot of human resources, time, and money to trace the routes of the confirmed case. In particular, as the number of confirmed cases have been increasing, the cost for finding closed contacts and blocking them in advance exponentially have almost reached the limitation of the budget. In finding closed contacts, all citizens must record an electronic access list every time they visit an amenities such as a store or a restaurant. This is likely the invasion of the privacy of personal location information. In this study, we designed a system that keeps one's location in real time, it will download the movement information of the confirmed case which is collected by KDCA, and it will notify the user when there is an overlap. Moreover, then guide for diagnostic test in advance will be used. The proposed method can solve the difficulty of recording in an electronic access list when visiting a store, and it can block infringement of privacy without providing personal information from KDCA.

인터넷 최강국, 정보보호 선진국을 위한 중점 추진과제

  • Kim, Hui-Jeong
    • Information and Communications Magazine
    • /
    • v.27 no.1
    • /
    • pp.28-34
    • /
    • 2009
  • 인터넷의 진화에 따라 우리사회는 매우 빠르게 변화하고 있으며, 이러한 변화를 선도한 인터넷은 앞으로도 개인 맞춤형, 사물 지능화 등으로 진화를 거듭하여 우리 삶에 더욱 큰 변화를 가져올 것이다. 경제적 측면에서도 인터넷을 기반으로 한 다양한 형태의 융합이 산업발전의 새로운 패러다임으로 대두되어 전력, 교통 등 산업간 융합이 가속화되고, 첨단 융합보안기술로 고(高)부가가치 신규 시장의 창출이 가능해질 전망이다. 그러나 인터넷, IT의 발전과 더불어 사이버 공격의 특성이 과거 호기심이나 자기 과시적 행태에서 조직적이고 금전적인 이익을 노리는 방향으로 확산되고 있으며, 인터넷의 익명성과 비대면성으로 인해 불건전 정보의 유통, 저작권 침해, 명예 훼손, 언어폭력 등 개인과 사회의 피해가 점증하고 있는 상황이다. 본고에서는 이러한 환경변화에 맞추어 융합을 통한 가치 창조적 정책 및 선진 인터넷 기반마련, 깨끗하고 안전한 인터넷 이용환경 조성, 글로벌 협력체계 강화 등의 전략 목표 달성을 통해 신뢰할 수 있는 인터넷 및 방송통신융합의 가치창조와 진흥이라는 미션을 완수하기 위한 한국인터넷진흥원의 주요 중점 추진과제를 정리하였다.

A Study on the Security Regulatory Issues in WiFi Network (WiFi의 보안문제와 개선방안 연구)

  • Kim, Sung Chul;MIn, Dae Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.678-681
    • /
    • 2009
  • WiFi는 무선인터넷 접속(Wireless LAN) 방식의 하나로서 이동성, 설치용이성, 유연성 등으로 인하여 널리 사용되고 있다. 더욱이 기존 다양한 디지털 기기들이 WiFi 기반의 application을 탑재하여 각종 온라인 콘텐츠를 이용할 수 있게 하면서 점차 보편적인 인터넷 접속수단으로서 변모하고 있는 상황이다. WiFi의 편리성으로 인하여 기업, 공공기관, 교육기관 등에서 네트워크 구축에 WiFi를 사용하는데 그 추세가 개인부문에서 기업부문으로 확산되고 있다. 하지만 유선인터넷이 케이블이라는 매체를 통해 연결되어 외부와 차폐된데 비해 WiFi는 주파수를 매개로하기 때문에 네트워크 접근이 용이하며 이로인해 보안이 취약해 질 수 있다는 것이다. 이로 인하여 일명 워드라이빙(war driving)이라 불리는 서비스의 무단사용뿐만 아니라 악의를 가진 네트워크 침입이 가능해져 개인정보나 사유재산이 침해 가능성이 높다고 할 수 있다. 이에 본 연구에서는 해외의 WiFi의 보안관련 법제도를 살펴보고 이로부터 국내 WiFi보안을 위한 대안을 제시하고자 한다.

  • PDF

Requirements and Technical Support for The Right to be Forgotten (잊혀질 권리를 지원하기 위한 요구사항 및 기술현황)

  • Kim, Jin-Duk;Lee, Soo-hyeok;Sin, Young-Tae
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.527-529
    • /
    • 2013
  • 인터넷의 발달은 개인정보의 디지털화를 가속화 시켰으며, 이로 인한 프라이버시 문제점을 야기 시켰다. 그 중 대표적으로 사생활 침해 문제가 대두되었으며 이러한 문제를 해결하기 위해 전 세계적으로 개인의 데이터를 자신이 삭제 할 수 있는 권리인 '잊혀질 권리'에 대한 관심이 높아지고 있다. 본 논문에서는 '잊혀질 권리'를 지원하기 위한 기술적 요구사항과 이를 지원 할 수 있는 대응 기술 현황에 대해 알아본다.

Legalization of Right to be Forgotten and Freedom of Press in the Digital Media Environment (디지털 미디어 환경에서 잊혀질 권리의 법제화와 언론의 자유)

  • Kim, Hyung-Il
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.21-27
    • /
    • 2013
  • With the advent of digital media environment, distribution way of information changes, legalization of the right to be forgotten is becoming increasingly necessary. However, too much emphasis on protection of personal information to hinder the development of the Internet industry and constitutional rights, including freedom of speech and right to know might be infringed. Thus, the scope of the right to be forgotten there is a need to clarify the rules. First, the rights of personal information can be divided into two. Right to be forgotten can be applied to the right to self-determination of personal information, but the right to self-determination information about social personality cannot be applied to. Second, in the digital media environment, old news article over the internet repeatedly distribution as the new damage is generating. Because old news article is a historical record, the right to be forgotten can not be applied. Thus, appropriate for digital media environment must find new ways.

Enactment Direction of Private Investigation Law (민간조사업법 제정방향)

  • Lee, Seung-Chal
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.123-129
    • /
    • 2011
  • The primary agent of civil investigation businesses must be a corporation to line up with public interests, and the government has to carry out the permit system on business owners. As many countries such as those of European and Japan supervise civil investigation business and the police agent supervises guarding businesses, so the police also has to supervise civil investigation business. In many cases, civil investigation businesses deal with private information, and the police has to prevent from infringing customers' basic right by clarifying private information management for punishment. In addition the police has to tighten up customers' obligations. For example the police has to deliver papers about the contents when they enter into or change contract, or after they enter into contract.

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.