• Title/Summary/Keyword: 개인정보침해

Search Result 617, Processing Time 0.027 seconds

The information of the businesses and the protection of information human rights (기업정보화와 정보인권보호)

  • 하우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.543-559
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers’side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers’side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals’with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

  • PDF

A Study on the International Discussion of Digital Trade Norms (디지털 무역규범의 국제적 논의에 관한 연구)

  • Hwang, Ji-Hyeon;Kim, Yong-Il
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • With the spread of digital trade, the share of digital trade under the global trade environment is increasing. However, since there is no international digital trade standard, the discussion to establish a new trade rule has important significance. Countries around the world are implementing digital trade policies in consideration of their own interests, but different regulatory policies are causing trade conflicts. In order to provide safeguards against personal information infringement due to the free movement of data across borders, major countries around the world have taken measures to localize data, and the EU has enacted GDPR. And the United States regards the imposition of the digital tax as a trade barrier, and some countries oppose the implementation of the digital tax for fear of negative impact on their countries. However, discussions on the global digital tax, centered on the OECD and the G20 are making progress. As it is highly likely that a digital tax agreement will be drawn up within this year, countermeasures must also be prepared. Therefore, this study presents implications for the future direction of Korea's trade policy by examining recent trends in digital trade norms and analyzing major issues in digital trade.

A study on Establishment and Management of the CCTV in Operating Room (수술실 CCTV 설치 및 운영에 대한 고찰)

  • Kim, Minji
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.109-132
    • /
    • 2019
  • Recently, medical accidents related to surgical procedures have increased. In addition, the media reported that some of these accidents were involved in health crimes. Patient-advocate groups have called for mandatory establishment and management of CCTV in operating rooms. There is a lot of discussion among the interested parties, so it is necessary to review the relevant laws and regulations. The purpose of this study is to identify the characteristics of CCTV in operating rooms and to review legislations related to establishment and management of the CCTV in operating rooms. Medical institutions use CCTV for management of facilities and patient safety and install it in operating rooms optionally. The Constitution guarantees the privacy and the privacy of correspondence of every citizen, but it can be limited by the law for public welfare. Currently, however, there is no existing law about establishment and management of the CCTV in operating rooms and it can be defect of legal system. Under the current legislations, it is likely that the Self-determination can be violated due to the characteristic of healthcare provider when CCTV is mandatorily installed in operating room. In addition, the regulations on access and leakage of confidential information known by operator are insufficient. So that, the safety of the visual data might be threatened. Furthermore, unless the period and the place of storage of the visual data are clearly defined, it is highly unlikely to meet the original purpose of patient safety and prevention of medical accidents. This study is meaningful as there is few previous study on this topic although the need for legal review about this is growing and several bills are being proposed. It is expected that the results of this study can be utilized as basic data for enactment or amendment of the laws and regulations about establishment and management of CCTV in operating rooms.

The Impact of the Risks and Benefits of Unmanned Store Services on Customer Satisfaction through the Theory of Planned Behavior (무인 점포 서비스의 위험과 혜택이 계획된 행동 이론을 통해 고객 만족에 미치는 영향)

  • Noh Hyeyoung;Lee Sinbok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.631-643
    • /
    • 2024
  • With the rapid advancement of digital technology, unmanned store services are on the rise, yet studies investigating their impact on customer satisfaction are scarce. This study aims to explore how unmanned store services affect customer satisfaction, focusing on the factors of risk and benefit. The methodology involved an online survey conducted from December 20 to December 30, 2023, targeting 260 customers who had used unmanned store self-service at least once, with 252 responses ultimately analyzed. The results reveal that the risk and benefit factors of unmanned store self-services complexly and diversely influence subjective norms and perceived control. Firstly, personal information breaches positively affected subjective norms, while overload and uncertainty had negative impacts. Secondly, while convenience negatively influenced subjective norms, playfulness and usefulness had positive effects. However, personal breaches and overload did not affect perceived control, whereas uncertainty did negatively. The findings of this study provide significant insights into how successful implementation and management of unmanned store self-services can regulate social expectations and control perception of customers, thereby enhancing customer satisfaction.

Study on the Korea Information System of Criminal Justice Services (형사사법정보시스템(KICS)의 활용실태 및 개선방안)

  • Shin, Sung Shik
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.141-147
    • /
    • 2015
  • KICS is intended to facilitate the computerization of the criminal justice process and realize a quick and transparent criminal justice process. Thus, it has been operating in the field of criminal justice by establishing criminal justice portal for the empowerment of the people. While in 2008 the opposition by the Court concerns the independent function of the judiciary and privacy violations presented in conjunction with its own operating system between the judiciary and other institutions. KICS improve office productivity by creating documents in a single criminal justice agencies to reduce costs, and costs of document exchange between criminal justice agencies. Secondly, the decision-making process is simplified by using the electronic documentation system and speed up, bind and document handling procedures ranging from preserving documents received are reduced dramatically contribute to the competitiveness of the organization through business improvement. Third, The use of an electronic document stored in the information is easy, and it is possible to easily access a variety of information can facilitate the realization of an open state by smoothly to provide information about the people. Finally, KICS building a network of criminal legal systems to maximize the benefits and the electronic integration effect it is being evaluated to improve the overall efficiency of the criminal legal system.

An Enhanced Data Utility Framework for Privacy-Preserving Location Data Collection

  • Jong Wook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.69-76
    • /
    • 2024
  • Recent advances in sensor and mobile technologies have made it possible to collect user location data. This location information is used as a valuable asset in various industries, resulting in increased demand for location data collection and sharing. However, because location data contains sensitive user information, indiscriminate collection can lead to privacy issues. Recently, geo-indistinguishability (Geo-I), a method of differential privacy, has been widely used to protect the privacy of location data. While Geo-I is powerful in effectively protecting users' locations, it poses a problem because the utility of the collected location data decreases due to data perturbation. Therefore, this paper proposes a method using Geo-I technology to effectively collect user location data while maintaining its data utility. The proposed method utilizes the prior distribution of users to improve the overall data utility, while protecting accurate location information. Experimental results using real data show that the proposed method significantly improves the usefulness of the collected data compared to existing methods.

A Study on the Regulations and Market of Location Based Service(LBS) (위치기반서비스(LBS)의 규제와 시장 활성화에 관한 연구)

  • Nam, Sunmi;Park, Minsu;Kim, Kyungshin;Kim, Seungjoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.4
    • /
    • pp.141-152
    • /
    • 2014
  • According to proliferation of smartphones and extension of various services utilizing location information, markets of Location Based Service(LBS) have been activating all over the world. However, as the privacy violations of personal location information have been continuously increased, interests in the deregulation have been grown as well. While the regulations of location information can protect personal information and privacy, it causes some negative affect in terms of development of diverse services and industry activation. In particular, Korea is the only country that has applied strict restrictions of LBS by making location information related independent 'Location Information Protection Act'. As a result of this, the issues that LBS industry has no longer developed in Korea and it is necessary for us to relax the regulations have been consistently raised. Thus, this study confirmed that there was the negative(-) relationship between the regulations and the market activation of LBS by comparing and analyzing the correlation between the market growth rate of LBS and relevant regulations at home and abroad; the regulations are strengthened, restrictions in market entry and the business performance can occur. In other words, LBS business will be able to be activated if the regulations which have not directly related to the privacy have been relaxed.

Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students (인터넷 윤리의식의 실태 분석 및 교육 효과 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1257-1269
    • /
    • 2010
  • The internet which is fast spread over all areas of our lives provides us with benefits of efficiency, productivity, and amusement; however, its features as an anonymous and non-face-to-face medium have raised a serious social issue of the collapse of internet ethics due to the abuse of it. Thereupon, the importance of internet ethics education has been highlighted to prevent side effects resulted from the internet and cultivate human-centered internet culture. In this paper, we suggests desirable methods for internet ethics education based on the investigation and analysis of the status of university freshmen's internet ethics. This research conducted a survey and analyzed its result after categorizing the status of internet ethics into the invasion of private information, invasion of intellectual property rights, harmful information, internet communication culture, cyber violence, internet addiction, and internet fraud. And based on the result of analyzing their internet ethics, this paper suggests desirable methods for internet ethics education. Next, internet ethics education was conducted by applying the proposed methods for internet ethics education, and its educational effect was evaluated. According to the result of verifying the educational effect measured statistically, it has proved that the suggested internet ethics education is effective to improve undergraduates' internet ethics.

A Study on Similar Trademark Search Model Using Convolutional Neural Networks (합성곱 신경망(Convolutional Neural Network)을 활용한 지능형 유사상표 검색 모형 개발)

  • Yoon, Jae-Woong;Lee, Suk-Jun;Song, Chil-Yong;Kim, Yeon-Sik;Jung, Mi-Young;Jeong, Sang-Il
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.55-80
    • /
    • 2019
  • Recently, many companies improving their management performance by building a powerful brand value which is recognized for trademark rights. However, as growing up the size of online commerce market, the infringement of trademark rights is increasing. According to various studies and reports, cases of foreign and domestic companies infringing on their trademark rights are increased. As the manpower and the cost required for the protection of trademark are enormous, small and medium enterprises(SMEs) could not conduct preliminary investigations to protect their trademark rights. Besides, due to the trademark image search service does not exist, many domestic companies have a problem that investigating huge amounts of trademarks manually when conducting preliminary investigations to protect their rights of trademark. Therefore, we develop an intelligent similar trademark search model to reduce the manpower and cost for preliminary investigation. To measure the performance of the model which is developed in this study, test data selected by intellectual property experts was used, and the performance of ResNet V1 101 was the highest. The significance of this study is as follows. The experimental results empirically demonstrate that the image classification algorithm shows high performance not only object recognition but also image retrieval. Since the model that developed in this study was learned through actual trademark image data, it is expected that it can be applied in the real industrial environment.

Research on Military SNS Protection Profile for National defense (국방정보보호를 위한 군(軍) SNS 보호프로파일(PP) 개발에 관한 연구)

  • Yu, DeokHoon;Kim, SeungJoo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.1
    • /
    • pp.41-52
    • /
    • 2013
  • Social Network Service(SNS) have become very popular during the past few years. Also SNS, an current communication platform, greatly contributes to transmit the information rapidly and strengthen a sense of community and fellowship in military service. however it has vulnerable factors. For example, invasion of privacy, exposure of personal information and military data. In this particular case, it is a deathblow to the military service. Military Social Network Service require to protect the military security threats and disclosure of defense secrets. For such reasons we need the secure SNS that protects from any attacks or vulnerable factors. We present classification of functional type and analysis the SNS architecture. The goal of this work is propose military SNS security functional requirements for practical use safely.