• Title/Summary/Keyword: 정보기술 역기능

Search Result 178, Processing Time 0.033 seconds

Securing Information Related Lawful Problems and it's Rationalities of Remedy (정보보호 관련 법의 과제와 합리적인 개선방향)

  • 이영수
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.71-83
    • /
    • 2003
  • The improvement of an information communicating technology provides mankind with a rationality of ancient technology, and gave us many benefits as they go beyond time and place. a society that requires information, improving information communicating technology had a revolution over us and is giving us good benefits. The improvement os an information communicating technology gave us benefits for sure. in the other hand, it is giving us a threat also. Important point in a growth of a knowledge information community is to search for a way to make positive function work better and to reduce the bad benefits. They discussed some ways that information society is blocking the growth of a knowledge information community, and the purpose of this essay is to get a step closer to solve these problems.

  • PDF

An Analysis of The Status of Domestic Information Security Technologies In ISO/IEC JTC1 (ISO/IEC JTC1의 국내 정보보호기술 표준화 현황 분석)

  • Lee, Seung-Hun;Park, Hee-Un;Shin, Jong-Whoi;Lee, Dong-Geun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1807-1810
    • /
    • 2003
  • 국내 정보통신 기술의 발달은 세계 최고 수준의 인터넷 인프라를 구축하는 기반이 되었다. 하지만 정보통신의 역기능 또한 함께 확대되어온 것이 현실이다. 이러한 역기능을 막기 위해 다양한 정보보호기술들이 개발 및 보급되었고 이러한 상황 속에 국내 정보보호 산업 또한 폭발적으로 성장하게 되었다. 그러나 국내시장을 중심으로 한 정보보호산업의 성장은 한계를 가질 수밖에 없다. 이러한 문제점을 해결하고 국내산업의 국제 경쟁력 강화는 물론 국제시장 선점효과를 높이기 위하여 국제 표준화 추진이 무엇보다 중요한 요소라 할 수 있다. 본 논문은 국제표준화 활동 기구인 ISO/IEC JTC1에서 국내 정보보호 기술의 표준상정 현황을 분석하여 현재 진행되고 있는 정보보호 기술표준 동향을 제공하고 향후, 국제 표준화 과제를 수행하기 위해 필요한 요구사항들에 대하여 기술하였다.

  • PDF

A Study for Development of Network Etiquette Awareness based Internet (인터넷 기반의 정보통신윤리 의식 함양에 관한 연구)

  • Oh, Taek-Hwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.308-310
    • /
    • 2010
  • 청소년의 인터넷 사용횟수가 급속히 증가하면서 그에 따른 역기능이 사회문제가 되는 시점에서, 학생들이 자신의 컴퓨터 활용 실태를 스스로 검토해 볼 수 있으며, 문제점이 있는 활용실태에 대한 현실감 있는 해결방법을 스스로 찾아볼 수 있는 기회와 환경을 제공하는 것이 필요하다. 청소년의 컴퓨터 활용과 관련한 역기능의 문제를 청소년 본인이 가장 정확하게 파악하고 있으며, 토론활동을 통하여 가장 효율적인 해결방안을 제시할 수 있는 대상도 청소년이다. 따라서 정보통신윤리 의식의 함양을 목적으로 학교 수업 시간에 적용이 가능한 웹 사이트 형태의 네티켓 코스웨어를 개발하여 적용하고자 한다.

  • PDF

An Empirical Study on the Adoption Intention of Informatization (구조방정식(LISREL)을 이용한 정보화수용의도 모델 실증 분석)

  • 박상규;최순영
    • The Journal of Information Technology
    • /
    • v.5 no.1
    • /
    • pp.13-28
    • /
    • 2002
  • This study examines the relationships between the adoption intention and ill results/"digital divide" of informatization. It is very important to enhance the ability to use the information around the country today. Government invested large sums in informatization. As a result, we became a leading country in the information and communication technologies (ICTs). But the speedy growth in information society enlarges the gab between 'information haves'and 'information have-nots', which results in decreasing the efficiency of informatization. Now, we have to consider the idea of "information welfare policy" to approach the problems of "information poor"which refers to those deprived of opportunities to access ICTS and use of the Internet. This paper shows that we can not reach the information welfare society without the solution of these problems, and which are obstacles to progress in informatization. It is hoped that the results from this study bridge and close so called "Digital Divide" within society and create the impartial information welfare society.e impartial information welfare society.

  • PDF

Design of Prevention Model according to a Dysfunctional of Corporate Information (기업 정보화 역기능에 따른 피해를 최소화하기 위한 기업 정보 처리 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.11-17
    • /
    • 2016
  • Recently, As the IT skills development, the different kinds of data (or information) generated by the company are becoming more frequent leaked to outside organizations and individuals. However, it is insufficient situation to reduce the dysfunctional corporate information at the enterprise level. In this paper, we propose a role-based enterprise information processing model to minimize the dysfunctions of corporate information. The proposed model is to allow you to set protect corporate information through the relevant departments for the management and supervision of enterprise information, and rapid and systematic recovery and operating strategy was to improve the efficiency of enterprise information services. The proposed model is caught blocking access to information access to information to establish a rapid and systematic recovery and operational continuity strategy after the administrator user permissions and roles that access to information is centrally managed by the user when the abnormality. In experimental results, virus damage was lower 48.8% than the previous model. In addition, information on the number of dysfunction distribution occurring within the company gained 17.9% lower results than the previous model.

A Study on Risk Issues and Policy for Future Society of Digital Transformation: Focusing on Artificial Intelligence (디지털 전환의 미래사회 위험이슈 및 정책적 대응 방향: 인공지능을 중심으로)

  • Koo, Bonjin
    • Journal of Technology Innovation
    • /
    • v.30 no.1
    • /
    • pp.1-20
    • /
    • 2022
  • Digital transformation refers to the economic and social effects of digitisation and digitalisation. Although digital transformation acts as a useful tool for economic/social development and enhancing the convenience of life, it can have negative effects (misuse of personal information, ethical problems, deepening social gaps, etc.). The government is actively establishing policies to promote digital transformation to secure competitiveness and technological hegemony, however, understanding of digital transformation-related risk issues and implementing policies to prevent them are relatively slow. Thus, this study systematically identifies risk issues of the future society that can be caused by digital transformation based on quantitative analysis of media articles big data through the Embedded Topic Modeling method. Specifically, first, detailed issues of negative effects of digital transformation in major countries were identified. Then detailed issues of negative effects of artificial intelligence in major countries and Korea were identified. Further, by synthesizing the results, future direction of the government's digital transformation policies for responding the negative effects was proposed. The policy implications are as follows. First, since the negative effects of digital transformation does not only affect technological fields but also affect the overall society, such as national security, social issues, and fairness issues. Therefore, the government should not only promote the positive functions of digital transformation, but also prepare policies to counter the negative functions of digital transformation. Second, the detailed issues of future social risks of digital transformation appear differently depending on contexts, so the government should establish a policy to respond to the negative effects of digital transformation in consideration of the national and social context. Third, the government should set a major direction for responding negative effects of digital transformation to minimize confusion among stakeholders, and prepare effective policy measures.

An Active Planning of the Information Security and Technology (정보보호와 기술의 활성화 방안)

  • 장우권
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.11 no.2
    • /
    • pp.83-112
    • /
    • 2000
  • In the 21st Century of the Knowledge-based Economy Internet's Openness, Globality, and Ease to access is the central axis to construct the new melting down and the development of the technology, industry. and culture. However it takes place the disordered ability in the information society. That is, to intrude personal privacy, unlawful actions, to circulate an illegal information, to encroach and to destroy information system, even to, to be in confusion society, national strategy, administration, economy, and military action. As conclusion, first, in this article it looks into and analyzes the information security technology and paradigm to prevent and to stop up criminal actions in the cyberspace. Second, this author propose an active planning of the information security and technology.

  • PDF

Effects of Lifelog Experience on Technology Satisfaction and Perception of Right to be Forgotten (라이프로그 이용이 기술 만족도와 잊혀질 권리 인식에 미치는 영향)

  • Yoon, Il-han;Kwon, Sun-dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.837-852
    • /
    • 2016
  • This study examined the life-log related ICT in terms of both positive effects and adverse effects. As results, from the perspective of positive effects, experience of using life-log related ICT affects the usefulness of ICT, whereas usefulness of ICT affects satisfaction of ICT. From the perspective of adverse effects, experience of using life-log related ICT affects concern over privacy, whereas concern over privacy affects the awareness of the right to be forgotten. And, Internet privacy efficacy moderates the impact of experience of using life-log related ICT and the impact of concern over privacy.

e-privacy와 정보보호기술

  • 박춘식
    • Review of KIISC
    • /
    • v.14 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • 인터넷과 정보통신기술의 발달로 인하여 e-privacy 문제가 최근 많이 거론되고 있다. 많은 내용들이 제도나 법 차원에서 논의되고 있으나 기술적인 관점에서의 논의는 다소 부족한 실정이다. 본 논문에서는 e-privacy와 정보보호 기술과의 관계를 검토하여 보고, privacy 침해 기술과 privacy 보호 기술 그리고 privacy 보호 기술의 중심이 되는 익명성과 익명성 구현 기술, 익명성이 가지는 역기능과 고려사항 등에 대하여 논의해 보고자 한다. e-privacy는 정보보호 기술과 밀접한 관계를 가지고 있으며, 법이나 제도 등과 함께 고려될 때 보다 나은 e-privacy가 제공될 것으로 생각된다.

과학과 윤리 특별기고 - 과학기술의 발전과 사회적 역기능

  • Park, Won-Sun
    • The Science & Technology
    • /
    • v.30 no.6 s.337
    • /
    • pp.18-19
    • /
    • 1997
  • 컴퓨터에 의한 대량의 정보집적과 관리는 개인의 프라이버시 침해가능성을 높이고 있다. 악명높았던 지존파가 현대백화점 고객명단을 확보하여 차례로 납치 살해하려던 계획을 털어놓았던 것처럼 41개의 개인신상정보를 수록, 관리하는 전자주민카드도 이 자료가 제3의 범죄조직에 넘어가는 경우 개인은 속수무책이기 때문에 철저한 대비책이 절실하다.

  • PDF