• Title/Summary/Keyword: 개인체계

Search Result 1,631, Processing Time 0.03 seconds

A study on the Development Plan of Personal Information Protection System (개인정보보호 체계 발전 방안에 대한 연구)

  • Sang-Hyun Joo;Byoung-Hoon Choi;Jin-Yong Lee;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.167-176
    • /
    • 2024
  • The Personal Information Protection Commission was launched in August 2020 as an integrated control tower for personal information protection, but several problems have been pointed out in the personal information protection operation system. First, despite the fact that Korea's personal information protection system has an integrated legal system that regulates both the public and private sectors, it has been pointed out that it is difficult to carry out smooth personal information protection functions due to incomplete integration of protection functions, such as the Financial Services Commission being in charge of personal credit information protection and the Korea Communications Commission being in charge of personal location information protection. Next, despite the increasing number of public sector personal information leakage incidents, there is a lack of personnel with expertise and specialized support organizations to efficiently investigate them, and there is a concern that the lack of an efficient response system to personal information infringement by global IT companies in Korea in the era of digital commerce may weaken the protection of citizens' personal information. In order to solve these problems, I reviewed overseas cases and literature and proposed the following measures. First, it is necessary to centralize the personal information protection supervision function for credit information and location information to the Personal Information Protection Commission. Second, it is necessary to secure expertise by securing specialized personnel and establishing specialized institutions to respond to public sector personal information leakage incidents. Third, it is necessary to revitalize the domestic agency designation system and establish an international cooperation system to protect people's personal information in the digital commerce era. I believe that these measures to develop the personal information protection system will lead to more systematic personal information protection.

A Study on the Life Satisfaction of Married Immigrant Women : focusing on ecosystem perspectives (결혼이주여성의 생활만족도에 관한 연구: 생태체계적 관점에서)

  • Kwon, Taeyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.239-250
    • /
    • 2018
  • This study classified the predictors affecting the life satisfaction level of married immigrant women into socio-demographic factors (age, education, personal system factors (Korean proficiency, self-rated health, depressed mood, multicultural attitude), family system factors (spouse relationship satisfaction, child relationship satisfaction, couple conversation time, decision-making status), and social factors (social support, social capital, experience of social discrimination, multicultural family support center use) based on ecosystem perspectives and comprehensively examined their effects. The data for 14,464 married immigrant women from the National Survey on Multicultural Families 2015 were analyzed through hierarchical multiple regression. The findings of this study are as follow. First, the results indicated that all ecosystem factors- that is personal, family, and social system factors-significantly affected life satisfaction level of married immigrant women and especially personal and family system factors increased the predictability on their satisfaction. Second, among all predictors, spouse relationship satisfaction was the factor most strongly associated with life satisfaction. Finally, the income variable among socio-demographic factors, depression among personal system factors, spouse relationship satisfaction among family system factors, and experience of social discrimination among social system factors all showed the strongest significant effects on the life satisfaction level of married immigrant women. These results suggest that comprehensive factors based on the ecosystem perspectives to intervene and promote the life satisfaction of married immigrant women should be considered.

개인정보보호를 위한 관리체계와 거버넌스

  • Kim, Jung-Duk
    • Review of KIISC
    • /
    • v.18 no.6
    • /
    • pp.1-5
    • /
    • 2008
  • 개인정보보호가 단순히 개인의 권익에 관한 문제로 국한되지 않고, 기업의 사활을 좌우하는 이슈로 대두되고 있다. 또한 개인정보의 활용과 보호라는 두 가지 상충되는 기업 내 목표와 관련 개인정보보호법이나 규정 준수 등 대내외 요구사항을 만족시켜야 한다. 기업 내 개인정보보호활동의 효과성을 높이기 위해서는 현재 산발적으로 진행되는 개인정보 영향평가 등 단순 기법이나 정보유출방지 솔루션 도입 등의 접근방법으로는 한계가 있으며 새로운 접근방법이 필요하다. 본 고에서는 일상적 관리활동의 하나로서 개인정보보호를 위한 관리체계의 필요성과 관리과정을 소개하며 이를 평가, 지시 및 모니터링 할 수 있는 거버넌스의 목표와 중요성에 대해 기술한다.

On UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System (신기통신망 번호체계로서 번호문 번호체계를 이용한 보편개인대표 번호의 구현방안)

  • Ku Jay-Il;Chinn Yong-Ok
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.165-172
    • /
    • 2006
  • This paper describes which UPAN System Implementation using an NAN System as Ubiquitous Numbering and Address System. IT is based to UPTN and eNUM and also scribed by NAN of the ortho phonic korean alphabet. other case, in English. the UPAN system is integrated by two kind of numbering system, one is PSTN, another is domain name and address based IP. By this result we contributed personal ID and many kind of numbering of telecommunications services and all kind of personal ID and numbering system by the proper auto-raising registration. Now, we are confirmed this is key solution of ubiquitous networking and defined supra service structures.

  • PDF

A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System (국가 개인식별번호체계 개선에 관한 연구 : 독립적 난수기반 개인식별번호체계로 전환)

  • Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.721-737
    • /
    • 2014
  • The Resident Registration Number(RRN) system has been effectively acted as a national identification system since it was enforced. On the other hand, there are some problems such as leakages of personal informations including RRNs on a large scale and each RRN makes a pair with each person in all areas of the society. Nevertheless leakages of them might cause a big damage, there is no radical countermeasure for they are never changed in actual fact. In Republic of Korea, a RRN acts as a primary key of a database, so it has to be protected by severing the connectivity between leaked RRNs and the other personal data. In this paper, the Unconnected Random Personal Identification Number system is proposed for preventing damage of data spills by removing a dependency which the RRN has. Furthermore, this paper suggests the solutions against some potential issues in the system.

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

국제 개인정보보호 표준화 동향 분석 (2017년 4월 해밀턴 SC27 회의 결과를 중심으로)

  • Youm, Heung-Youl
    • Review of KIISC
    • /
    • v.27 no.5
    • /
    • pp.43-48
    • /
    • 2017
  • 개인정보관리체계 [1,2] 를 구축하기 위해서는 관리체계를 위한 요구사항과 프라이버시 통제가 필요하다. 국내에서 시행되고 있는 개인정보관리체계도 요구사항과 개인정보 전주기동안의 프라이버시 보호조치에 근거해 시행하고 있다. 빅데이터 환경에서는 개인정보를 처리하기 위한 비식별화 기법(de-identification technique)이 요구된다. 그리고 온라인 사용자 친화적 고지 및 통보 방법이 필요하다. 국제표준화위원회/전기위원회 합동위원회 1의 정보보호기술연구반 신원 관리 및 프라이버시 작업반 (ISO/IEC JTC 1/SC 27/WG 5)에서는 개인정보보호를 위한 여러 가지 국제표준을 개발하고 있다[20],[21],[22],[30]. 본 논문에서는 작업반 5에서 2017년 4월 뉴질랜드 해밀턴 SC27 회의에서 논의된 개인정보보호 관련 주요 표준화 이슈와 대응 방안을 제시한다.

국제 개인정보보호 표준화 동향 분석 (2016년 4월 탬퍼 SC27 회의 결과를 중심으로)

  • YOUM, HeungYoul
    • Review of KIISC
    • /
    • v.26 no.4
    • /
    • pp.6-10
    • /
    • 2016
  • 기업의 개인정보보호 수준을 강화하기 위한 개인정보보호관리체계 인증을 구축하기 위해서는 개인정보관리체계를 위한 추가 요구사항, 보안 측면의 통제, 프라이버시 측면의 통제가 요구된다[1,2]. 국제표준화위원회/전기위원회 합동위원회 1의 정보보호기술연구반 신원 관리 및 프라이버시 작업반 (ISO/IEC JTC 1/SC 27/WG 5)에서는 개인정보보호를 위한 여러 국제 표준을 개발하고 있다[18, 32, 22]. 본 논문에서는 작업반 1과 작업반 5에서 2016년 4월 SC27 회의에서 논의된 개인정보보호 관련 주요 표준화 이슈와 대응 방안을 제시한다.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Development Direction of Personal Authentication System (개인 인증 체계의 발전 방향)

  • Yang, Gi-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.117-119
    • /
    • 2021
  • In this paper, the strengths and weaknesses of each type of personal authentication system are examined and the development direction of the personal authentication system is presented. Currently, the personal authentication system commonly used is a text-based password system. However, most of the current text-based password systems are weak in usability and security. In order to solve this problems a personal authentication system that can replace the text-based password system is required. In this paper, we take the recently developed graphical password system as an example to find the conditions and possibilities to replace the text-based password system, and present the development direction of the personal authentication system.

  • PDF