• Title/Summary/Keyword: 사생활침해

Search Result 171, Processing Time 0.026 seconds

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

A study on the Improvement of Private Investigators System in Korea (한국 민간조사제도의 발전방향: 시험제도와 교육훈련 중심(中心)으로)

  • Lee, Sang-Won;Park, Yun-Kyu
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.337-365
    • /
    • 2007
  • The society shows rapid change throughout various fields in the 21 century. These changes are in progress in Korea as well and the private security field is not in exception. The private security system has socially effective function by providing services, which the police cannot provide to citizen. However, it cannot be treated rightly the possibility of violation of human right during the actual action. The qualified person at least should take private investigation service considering privatization of criminal justice and considering that the Private Investigation Act submitted to the Congress could not affect its investigation authority to the citizen currently. The purpose of this study is examination of the private investigation system in Korea and other country and is presentation of its improvement. The chapter 1 composed of introduction on chapter 1, concept and service in chapter 2, private security system in other countryin chapter 3, private security system in chapter 4, problems and its improvements in chapter5, and conclusion in chapter 6. It requires not only consideration of government but also consideration of citizen and effort of both sidesto successful settlement of private security system in Korea.

  • PDF

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

Research of the Face Extract Algorithm from Road Side Images Obtained by vehicle (차량에서 획득된 도로 주변 영상에서의 얼굴 추출 방안 연구)

  • Rhee, Soo-Ahm;Kim, Tae-Jung;Kim, Moon-Gie;Yun, Duk-Geun;Sung, Jung-Gon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.1
    • /
    • pp.49-55
    • /
    • 2008
  • The face extraction is very important to provide the images of the roads and road sides without the problem of privacy. For face extraction form roadside images, we detected the skin color area by using HSI and YCrCb color models. Efficient skin color detection was achieved by using these two models. We used a connectivity and intensity difference for grouping, skin color regions further we applied shape conditions (rate, area, number and oval condition) and determined face candidate regions. We applied thresholds to region, and determined the region as the face if black part was over 5% of the whole regions. As the result of the experiment 28 faces has been extracted among 38 faces had problem of privacy. The reasons which the face was not extracted were the effect of shadow of the face, and the background objects. Also objects with the color similar to the face were falsely extracted. For improvement, we need to adjust the threshold.

  • PDF

A Study for Applicating and Introducing the Right to be Forgotten (잊혀질 권리의 도입과 적용에 관한 연구)

  • Seo, Yunhee;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.3
    • /
    • pp.23-28
    • /
    • 2016
  • As a large portal sites are beginning to replace the function of the mass media, new risks began to raise. It remained without being deleted that data written to the internet was a serious privacy problem occurs. The sensitive information was inferred based on the personal data recorded in the past and also another personal information leakage itself. Witch-hunt through the personally identifiable rob has emerged as a serious social problem and damage to the parties not be able to live a normal life. In this paper, we propose the study on the need for a 'right to be forgotten' to delete the personal information relating to on-line through international case studies and activation measures. At the same time, we proposed improvement measures, such as encryption management, ownership inheritance, and blind treatment.

Study on Decision-making and Control of Personal Data Posted on the Internet (인터넷에 올라와 있는 개인정보의 자기결정권과 통제권에 관한 연구)

  • Yoon, KyungBae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.227-232
    • /
    • 2014
  • Recent development and generalization of Internet technology contributes to the large scale of commerce and capital followed by appearance and growth of large portal sites. As a result, the personal data on the Internet not deleted for a long period of time is a new risk factor, for example, the invasion of people's privacy. In particular, exposing personal data like witch-hunts is a critical issue so that the person concerned cannot carry on with normal life. This study suggests the necessity of the right to request personal data deletion related to a person concerned on Internet sites, a method of introducing the right in Korea, and a method of improving the application.

A Study of Anti-collision algorithm based on RFID for Medical Service (의료 서비스를 위한 RFID 기반 충돌방지 알고리즘에 관한 연구)

  • Park, Joo-Hee;Park, Yong-Min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.434-437
    • /
    • 2006
  • Today, Hospital Information System that integrates ubiquitous technologies are introduced in limited basis due to problems like standardization and limits on medical use, where responsibilities lie, legal safeguard on transmission, invasion of privacy etc. Particularly, problems like absence of tag design suitable for medical environment, compatibility issue with previous medical information system. In order to solve such problems, we have designed medical tags for the first time that are consistent with future ubiquitous environment by deciding on medically suitable field with 96bit tag offered by EFC as its base. Second, improving on previous multi-tag recognizing crash prevention algorithm, we have designed a priority anti-collision algorithm that reflects priorities on the needs in medical environment.

  • PDF

Discussions on Regulation and Use of Police Drones (경찰활동상 드론규제와 활용을 위한 논의)

  • Park, Han-Ho;Kim, Sung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.408-415
    • /
    • 2017
  • The aim of this study is to discuss some of the prominent ideas which use drone for police works. Focusing on the extent of the utility and practicability of using drone in policing, this paper attempts to address both positive and negative aspects in conjunction with related statutes and regulations. This study uses a qualitative case study approach and offers three practical implications including: (1) enacting a law that covers using drones in policing, (2) hiring technical professionals or training police officers to prevent illegal drones and to implement a variety of policing strategies, and (3) collecting data and information on crime and criminals and then developing the best way to respond to these problems.

Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment (분산형 인공지능 얼굴인증 시스템의 설계 및 구현)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3-Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

  • PDF