• Title/Summary/Keyword: 정보보호 개인적 가치

Search Result 104, Processing Time 0.022 seconds

초연결사회로의 변화와 개인정보 보호

  • Seon, Won-Jin;Kim, Du-Hyeon
    • Information and Communications Magazine
    • /
    • v.31 no.4
    • /
    • pp.53-58
    • /
    • 2014
  • 초연결사회의 구현을 위해서는 다양한 객체를 연결하는 사물인터넷, 연결 사이를 흐르는 데이터 속의 가치를 찾아내는 빅데이터, 그리고 빅데이터의 관련 기술인 클라우드 컴퓨팅 등 핵심기술이 유기적으로 활용되고 있는데, 이 과정에서 발생하는 개인정보 침해의 위험성을 파악하고, 이에 대한 대응 방안을 모색하고자 한다.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

A Study on Personal Information Protection System for Big Data Utilization in Industrial Sectors (산업 영역에서 빅데이터 개인정보 보호체계에 관한 연구)

  • Kim, Jin Soo;Choi, Bang Ho;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2019
  • In the era of the 4th industrial revolution, the big data industry is gathering attention for new business models in the public and private sectors by utilizing various information collected through the internet and mobile. However, although the big data integration and analysis are performed with de-identification techniques, there is still a risk that personal privacy can be exposed. Recently, there are many studies to invent effective methods to maintain the value of data without disclosing personal information. In this paper, a personal information protection system is investigated to boost big data utilization in industrial sectors, such as healthcare and agriculture. The criteria for evaluating the de-identification adequacy of personal information and the protection scope of personal information should be differently applied for each industry. In the field of personal sensitive information-oriented healthcare sector, the minimum value of k-anonymity should be set to 5 or more, which is the average value of other industrial sectors. In agricultural sector, it suggests the inclusion of companion dogs or farmland information as sensitive information. Also, it is desirable to apply the demonstration steps to each region-specific industry.

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

The Challenge of Personal Information Act for Oral History Project (구술자료의 수집과 서비스에 대한 개인정보 보호법의 도전)

  • Lee, Hosin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.1
    • /
    • pp.193-216
    • /
    • 2017
  • The purpose of this study is to understand issues related to the Personal Information Act recently emerging in the field of oral history, and to prepare countermeasures for oral history academics and archives. The Personal Information Act is intended to protect the confidentiality and freedom of the constitutional privacy, and to assure the right to self-determination of information, thereby realizing the dignity and value of the individual. Oral history is intended for living persons; therefore, strict ethical standards are needed to protect the morality of the person behind the sound recordings and appears as the subject of oral history. However, if the uniform application of the Personal Information Act is made, it is a requirement to make the process of consenting and notifying excessively complex and almost impossible to realize, making collection and service of oral history resource improbable. The mechanical and strict application of the Personal Information Act does not come into being because it has the aspect of undermining the inherent intrinsic value of oral history resources and making it difficult to maintain the authenticity of the records. To solve these problems, it is necessary to revise Article 58 (4) of the Personal Information Act of Korea. In addition, it is necessary to establish a guideline for the establishment of independent ethical standards of oral history itself, especially for the protection of the moral rights of third parties.

A Study on the Protection and Utilization of Personal Information for the Operation of Artificial Intelligence and Big Data in the Fourth Industrial Revolution (4차 산업혁명기 인공지능과 빅데이터 운용을 위한 개인정보 보호와 이용에 관한 연구)

  • Choi, Won Sang;Lee, Jong Yong;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.63-73
    • /
    • 2019
  • In the 4th Industrial Revolution, information is collected and analyzed from people and objects through the rapid development of ICT. It is possible to create value. However, there are many legal and institutional restrictions on the collection of information aimed at people.Therefore, in-depth research on the protection and use of personal information in the rapidly changing cyber security environment is needed. The purpose of this study is to protect and utilize personal information for the operation of AI (Artificial Intelligence) and big data during the 4th Industrial Revolution. It is to seek a paradigm shift. The organization of the research for this is: Chapter 1 examines the meaning of personal information during the 4th Industrial Revolution, Chapter 2 presents the framework for the review and analysis of prior research. In Chapter 3, after analyzing policies for the protection and utilization of personal information in major countries, Chapter 4 looks at the paradigm shift in personal information protection during the 4th Industrial Revolution and how to respond. Chapter 5 made some policy suggestions for the protection and utilization of personal information.

A Study on "The Right to be Forgotten" in Cyber Space (사이버 공간에서의 '잊혀질 권리')

  • Park, Kwang-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.121-123
    • /
    • 2015
  • 본 논문에서는 잊혀질 권리에 대한 법정책적 검토를 논하고자 한다. 잊혀질 권리는 다른 기본권과 충돌할 수밖에 없기 때문에 이 권리를 법률로 구체화하는데 다각적인 학제 간 연구가 선결문제로써 검토되어야 한다. 정보 주체에게 잊혀질 권리를 법제화하는 것은 그 정보를 사용하려는 사람의 표현의 자유 및 국민의 알권리를 제한하는 결과를 초래하기 때문에 일정한 한계를 노출할 수밖에 없다. 비록 현행 개인정보보호법 및 정보통신망 이용촉진 및 정보보호 등에 관한 법률 제44조의 2는 개인정보의 파기제도를 신설하여 부분적으로 잊혀질 권리를 반영하고 있지만 헌법상 중요한 가치인 프라이버시권과 표현의 자유 및 알권리의 조화롭게 균형을 찾는 것이 선행과제인 것이다.

  • PDF

The Design and Implementation of a Open Location-based Service Platform (개방형 위치 기반 서비스 플랫폼 설계 및 구현)

  • Lee, Dong-Jin;Park, Joo-Hoon
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2005.05a
    • /
    • pp.87-95
    • /
    • 2005
  • 최근 LBS는 모바일 단말의 보급화와 더불어 미들웨어, 무선통신, 위치 측위기술의 발전과 '위치정보 보호 및 이용에 관한 법률' 제정 등 제도적인 안전장치가 마련되면서 우리의 생활에 더욱더 밀접하게 자리 잡고 있다. 기존의 친구 찾기, 지도검색 등 초창기서비스에서 최근 모바일 119서비스, 모바일상거래, 네비게이션등 다양하고 부가가치가 높은 서비스형태로 발전하고 있다. 이에 기존의 각 통신사에 의존적인 서비스에서 통합된 위치정보 제공 시스템의 필요성이 대두되고 되고 있으며, 또한 위치정보의 이용 및 보호에 관한 법률제정으로 개인 위치정보 보호 기술이 절실히 요구되고 있다. 그리고 새로운 위치기반 서비스의 출현과 활성화에 따른 망 부하를 최소화하기 위한 미들웨어 기술의 요구와 기존 유 무선 위치기반 서비스들을 통합하기 위한 미들웨어 기술들이 요구되고 있다. 본 논문에서는 각 통신사별 통합된 위치정보 제공을 위한 미들웨어 기술과 개인 위치정보 보호 기술, 그리고 유 무선 통합 미들웨어 기술들에 대해 살펴본다. 또한 기존의 위치 트리거링(triggering)기술을 확장하여 단말과의 연동을 통한 트리거링 서비스에 대해 살펴본다.

  • PDF