• Title/Summary/Keyword: 국가 지능정보화

Search Result 71, Processing Time 0.024 seconds

Risk based policy at big data era: Case study of privacy invasion (빅 데이터 시대 위험기반의 정책 - 개인정보침해 사례를 중심으로 -)

  • Moon, Hyejung;Cho, Hyun Suk
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.63-82
    • /
    • 2012
  • The world's best level of ICT(Information, Communication and Technology) infrastructure has experienced the world's worst level of ICT accident in Korea. The number of major accidents of privacy invasion has been three times larger than the total number of Internet user of Korea. The cause of the severe accident was due to big data environment. As a result, big data environment has become an important policy agenda. This paper has conducted analyzing the accident case of data spill to study policy issues for ICT security from a social science perspective focusing on risk. The results from case analysis are as follows. First, ICT risk can be categorized 'severe, strong, intensive and individual'from the level of both probability and impact. Second, strategy of risk management can be designated 'avoid, transfer, mitigate, accept' by understanding their own culture type of relative group such as 'hierarchy, egalitarianism, fatalism and individualism'. Third, personal data has contained characteristics of big data such like 'volume, velocity, variety' for each risk situation. Therefore, government needs to establish a standing organization responsible for ICT risk policy and management in a new big data era. And the policy for ICT risk management needs to balance in considering 'technology, norms, laws, and market'in big data era.

  • PDF

Trend Analysis of ICT Accessibility and Utilization Levels of Korean Students based on OECD PISA Data (OECD PISA 자료를 활용한 우리나라 학생들의 ICT 접근 및 활용 수준 추이 분석)

  • Kim, Hye-Sook;Kim, Han-Sung;Kim, Jin-Sook;Shin, An-Na
    • Informatization Policy
    • /
    • v.24 no.4
    • /
    • pp.17-43
    • /
    • 2017
  • The purpose of this study is to investigate the directions of information and communication technology(ICT) education in K-12 based on the analysis of ICT accessibility and utilization levels of Korean students. To this end, we analyzed the trends of Korea and OECD countries by survey period, focusing on the OECD PISA 'ICT familiarity survey' conducted in 2009, 2012 and 2015. The surveyed subjects were 15 year-old students and the analysis method was calculated based on the sampling weights. The results of the analysis of Korean students are as follows: First, ICT accessibility at home increased from 2009 to 2015, but was consistently lower than the OECD average. Second, the overall Internet usage time was lower than the OECD average. The Internet usage time on weekdays increased from 2012 to 2015, but on weekends decreased. Third, the ICT accessibility in schools decreased from 2009 to 2012, and increased in 2015, but was lower than the OECD average in 2015. Fourth, the student age ratio of first time computer usage increased from 2012 to 2015 and the average age for computer usage began before age 6, but was below the OECD average. Lastly, student use of digital devices for items such as Internet searches for entertainment and SNS activity has increased from 2012 to 2015, but the level of everyday use such as e-mail, online chat, program downloading, and reading Internet news has decreased. Based on these results, this study suggested policy plans for the improvement of ICT education for elementary and secondary school students in Korea.

Analysis of Research Trends of Cyber Physical System(CPS) in the Manufacturing Industry (제조 분야 사이버 물리 시스템(CPS) 연구 동향 분석)

  • Kang, Hyung-Muck;Hwang, Kyung-Tae
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.3-28
    • /
    • 2018
  • The purpose of this study is to analyze the research trends and present future research directions in the field of Cyber Physical System (CPS), a key element in the 4th Industrial Revolution, Industry 4.0, and Smart Manufacturing that are currently promoted as important innovation agenda both at home and abroad. In this study, (1) the concepts of industry 4.0, smart manufacturing and CPS are summarized; (2) analysis criteria of these fields are established; and 3) analysis results are presented and future research direction is proposed. 74 overseas and 8 domestic literature on manufacturing CPS from 2013 to 2017 are identified through 'Google Scholar Search'. Major results of the analysis are summarized as follows: (1) research on a common methodology and framework for the manufacturing CPS needs to be done based on the analysis of the existing methodologies and frameworks of various perspectives; (2) in order to improve the maturity of the manufacturing CPS, it is necessary to study actual deployment and operations of CPS, including the existing systems; (3) it is necessary to study the diagnostic methodology that can evaluate manufacturing CPS and suggest improvement strategy; and (4) as for the detailed model and tool, it is necessary to reinforce research on SCM production planning and human-machine collaboration while considering the characteristics of CPS.

A Study on Developing Policy Indicators of Personal Information Protection for Expanding Secure Internet of Things Service (안전한 사물인터넷 서비스 확산을 위한 개인정보보호정책평가지표 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.29-51
    • /
    • 2018
  • As the core technology of the Fourth Industrial Revolution, the Internet of Things has been developed and has enabled various services, and personal information has been handled freely in the process. However, the infringement threat of personal information is increasing as more convenient services are provided and more information devices including smart devices are connected to the network. Therefore, this study is to analyze prioritizing personal information protection policy indicators in order to provide IoT services by constructing secure environment for implementing the Internet of things as the core technology of the 4th Industrial Revolution. This study reviewed personal information protection policy indicators based on the literature survey, and identified 3 fields, 9 areas, and 25 indicators through Delphi analysis for experts. The weights were calculated based on the AHP survey for 66 experts and the results were used to present the relative importance and priority of the policy indexes. The results of this study found the policy field was the most important, followed by the technical field, and the administrative field. Of the three areas of the policy field, strengthening the personal information protection laws related to IoT is the most important, while among the indicators, promoting and revising the personal information protection law related to IoT is the most important. Comparisons of the fields, areas, and indicators of IoT-related personal information protection policies found consistent values. The personal information protection policy indicators derived this way will contribute to the nation's competitiveness by expanding secure IoT policies in the future.

A Meta Study on Research Trend of Digital Forensic in Korea (메타스터디를 통한 국내 디지털 포렌식 연구 동향)

  • Kwak, Na-Yeon;Lee, Choong C.;Maeng, Yun-Ho;Cho, Bang-Ho;Lee, Sang-Eun
    • Informatization Policy
    • /
    • v.24 no.3
    • /
    • pp.91-107
    • /
    • 2017
  • Digital forensics is the process of uncovering and interpreting electronic data and materials found in digital device in relation to crime. The goal of the process is to preserve any evidence in its most original form which shall be having the force of law. The digital forensic market is increasing with a growth of ICT in domestic and global market. Many countries including U.S. are actively performing researched regarding a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events which so does in academic society in Korea. This paper is to understand overall research trend about digital forensics and derive future strategy by integrating the result of meta-analysis into practices based on five criteria - main theme and topic, analysis phase, technical method for analysis, author's affiliation, and unit of analysis and method. 239 papers are analyzed, which were selected out of 470 papers published for 10 years (2007~2016) in academic journal on the list of KCI (Korea Citation index). The results of this analysis will be used to examine the characteristics of research in the field of digital forensics. The result of this research will contribute to understanding of the research trend and characteristics leading the technology-driven academia, through which measures for further research development and facilitation are suggested.

A Study on Developing the Model of Reasonable Cost Calculation for Privacy Impact Assessment of Personal Information Processing System in Public Sector (공공기관 개인정보 처리시스템의 개인정보 영향평가를 수행하기 위한 합리적인 대가 산정 모델 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.22 no.1
    • /
    • pp.47-72
    • /
    • 2015
  • According to the progress of national informatization throughout the world, infringement and threaten of privacy are happening in a variety of fields, so government is providing information security policy. In particular, South Korea has enhanced personal impact assessment based on the law of personal information protection law(2011). But it is not enough to effect the necessary cost calculation standards and changeable factors to effect PIA. That is, the budgets for PIA was calculated lower than the basic budget suggested by Ministry of Government Administration Home affairs(2011). Therefore, this study reviewed the cost calculation basis based on the literature review, cost basis of similar systems, and reports of PIA and obtained to the standard with Delphi analysis. As a result, the standards of PIA is consisted to the primary labors and is utilized to how the weights by division of target system, construction and operating costs of target system, type of target systems, etc. Thus, the results of this study tried to contribute to ensure the reliability of PIA as well as the transparency of the budget for privacy in public sector.

A Study on the Improvement Measures for the Management and Utilization of Korea's Fiscal Government Data: Focusing on Fiscal Data Governance (재정데이터의 관리 및 활용을 위한 개선방안 연구: 재정데이터 거버넌스를 중심으로)

  • Song, Seok-Hyun
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.95-111
    • /
    • 2021
  • To achieve a data-driven policy decision-making system, the Ministry of Strategy and Finance has formed a marketing team and is actively building upon it. This system, currently under construction, will enable data-driven financial tasks beyond simple financial administration. The U.S. has already enacted The Foundations for Evidence-Based Policymaking Act in the process of similar pursuits. Since last year, the data-driven system administrative law has been enacted in Korea, and a legal framework has been established for data-driven administrative work. The next-generation budget accounting system to fulfill its role as a data-driven system needs public policy support to operate. Innovation and transformation are needed in various areas such as data management, legal system, and installation of related systems. Accordingly, it is very timely to analyze the financial systems and policies of advanced countries such as the U.S. and U.K., which already have established and operates such a financial system. By benchmarking and applying existing financial information systems to the next-generation budget accounting system, a better system will result. In this study, major developed countries, including the U.S., U.K., France, and Canada were benchmarked and analyzed in terms of the main elements of data governance: public policy, systems, legal framework, promotion system, and service level. It was discovered that the role and direction of the national fiscal policy system that the people favor should be able to respond quickly to the recent difficult economic crisis environment such as the digital transformation trend and COVID-19.

A Study on Ex-post Regulation of Zero-rating Service - Comparative Legal Study on Relevant Laws and NRA's Decisions Between Domestic and Overseas Countries - (제로레이팅 사후규제 방안에 대한 연구 - 국내 및 해외 주요국 법령 및 심결의 비교법적 고찰 -)

  • Cho, Dae-Keun;Hong, Joon-Hyung
    • Informatization Policy
    • /
    • v.26 no.1
    • /
    • pp.83-105
    • /
    • 2019
  • The purpose of this study is to analyze the domestic and overseas laws and regulators' decisions related to zero-rating (ZR) practices through a comparative approach and to support development of the ex-post regulation. Although most countries are adopting ex-post regulatory approaches toward the globally increasing ZR practices, there is no uniform standards or an approach to consider when deciding whether to allow mobile ISPs' zero-rating practices in the market. However, in recent years, some countries have been improving their policy transparency with respect to ZR through enacting and amending relevant laws as well as making trial decisions. The comparative analysis shows that each country investigates restriction of the user choice and ISPs' adherence to the obligation of non-discrimination in order to judge whether the user benefits are damaged by the ZR practices. It also investigates ISP-CP's market positioning and ISP's vertical integration for profit squeeze to find out whether they harm fair competition with ZR practices in the mobile ecosystem. Based on the results of the comparative analysis, we suggest the desirable ZR regulatory directions under the domestic legislative status.

The New Social Contract and the Digital Bill of Rights : Focusing on Political and Social Context and Institutionalization (새로운 사회계약과 디지털 권리장전: 정치·사회적 맥락과 제도화를 중심으로)

  • Jo, Gye-Won
    • Informatization Policy
    • /
    • v.31 no.1
    • /
    • pp.53-71
    • /
    • 2024
  • Digital transformation calls for a new social contract that must transform the existing norms and paradigms of our society. Digital constitutionalism is a way of building new order through a new social contract and is an ideology that aims to establish and ensure a normative framework for the protection of fundamental rights and balance of power in the digital environment. The Internet/Digital Bill of Rights is a representative example of constitutionalization based on this ideology. Initially, it took the form of an informal, non-binding declaration led by civil society organizations or various stakeholders, setting forth normative principles adapted to the changing nature of digital society. More recently, they have taken the form of formal charters, declarations, or laws containing principles at the national or regional level. The "Digital Bill of Rights" proposed by the Korean government can be seen as an example of this trend, but it does not fully reflect the recent trend of Internet/Digital Bills of Rights in terms of substantive and procedural legitimacy. Even if the government provides a certain normative direction, it needs to be combined with a concrete action plan in each area to create a balance of norms with digital technologies and industries instead of simply being a "declaration".

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.