• Title/Summary/Keyword: 프라이버시 보호행동

Search Result 40, Processing Time 0.029 seconds

Neonatal Nurse's Professional Self-concept and Behavior to Protect Patient Privacy (신생아를 돌보는 간호사들의 전문직 자아개념 및 환자 프라이버시 보호행동)

  • Yu, Mi;Kim, Miok
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.18 no.4
    • /
    • pp.424-433
    • /
    • 2012
  • Purpose: With the rapid increase in information technology in the medical environment, protection of patient's privacy is a crucial issue to hospital nurses. The purpose of this study was to determine neonatal nurses' perception and performance of behavior to protect patient privacy, and professional self-concept, and to investigate the relationships among these variables. Methods: The participants in this descriptive correlation study were 182 nurses in nursery and neonatal intensive care units using EMR or OCS in November, 2011. Results: Perception and performance averaged 4.61 and 4.04 (out of 5) respectively, and the average score for professional self-concept was 2.73 (out of 4). There was a significant difference between perception and performance. The performance of behaviour to protect patient privacy had a positive correlation with perception and professional self-concept. Multiple regression analysis showed that the key determinants of performance were recognition of necessity of patient privacy education, professional self-concept and perception, and these explained 36% of the total variance of performance. Conclusion: Study results indicate a need to establish policy to protect privacy of neonates and their families, and to develop educational programs to enhance neonatal nurses' perception and performance.

Factors Influencing Patient Privacy Protection Behavior among Nursing Students (간호대학생의 환자 프라이버시 보호행동 영향요인)

  • Lee, Eun Joo;Shin, Hyun Sook;Ha, Eun Chae
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.3
    • /
    • pp.225-234
    • /
    • 2018
  • Purpose: The purpose of this study was to identify factors influencing patient privacy protection behavior among nursing students and examine the relationships between these factors. Methods: Participants in this study were 144 nursing students who have experienced clinical practice. The data were analyzed using descriptive statistics, one-way ANOVA, Scheffe test, Pearson's correlation coefficient, and multiple regression with IBM SPSS Win 23.0 program. Results: Professional self-concept and ethical values were factors influencing patient privacy protection behavior among nursing students. These variables explained 21.9% of the variance for patient privacy protection behavior. A higher level of patient privacy protection behavior was associated with higher levels of professional self-concept and ethical values. Conclusion: The findings demonstrate that strategies for enhancing patient privacy protection behaviors of nursing students should include methods for forming images of positive nurses and firming ethical values.

A Study on Protecting Patients' Privacy of Obstetric and Gynecologic Nurses (산부인과 간호사의 환자 프라이버시 보호행동에 관한 연구)

  • Kim, Miok
    • Women's Health Nursing
    • /
    • v.18 no.4
    • /
    • pp.268-278
    • /
    • 2012
  • Purpose: This study aims to determine obstetric and gynecologic (OBGY) nurses' perception and performance propecting patients' privacy, and to contribute to develop educational program and improve the quality of nursing care. Methods: 206 OBGY nurses in 6 hospitals using an electronic medical record or an order communicating system were chosen by convenience sampling and agreed to participate in the study. The questionnaire, explored 4 domains of privacy: direct nursing, linked business, patient information management, communication with relatives. Results: Perception and performance of protecting patient privacy averaged 4.29 (of 5) and 3.55 (of 5), respectively. Most nurses (94.2%) recognized the importance of protecting patient privacy, 80.1% received patient privacy education. There was a distinct difference between the perception and performance of protecting patient privacy of nurses. Performance of protecting patient privacy had a positive correlation with perception. Conclusion: Proper performance of protecting privacy protection requires improving perception of each nurse on the patient privacy, and various efforts should be made to minimize the affect from external factors such as hospital environment. It is needed to educate nurses for patient privacy. It is also needed for medical organizations to improve their policies and facilities to ease the performance for privacy protection.

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

Face Information Conversion Mechanism to Prevent Privacy Infringement (프라이버시 침해 방지를 위한 얼굴 정보 변환 메커니즘)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.6
    • /
    • pp.115-122
    • /
    • 2019
  • CCTV(Closed-Circuit Television) is increasingly exposed to CCTV per person as the number of installations increases every year for accident prevention and facility safety. The intelligent video surveillance system technology is attracting attention to the privacy protection of exposed subjects. The intelligent video surveillance system performs a process for the privacy protection so as to perform the action type of the subject and the judgment of the situation in the simple identification of the photographed image data, or to prevent the information, from which the information of the photographed subject is exposed. The proposed technique is applied to the video surveillance system and converts the original image information taken from the video surveillance system into similar image information so that the original image information is not leaked to the outside. In this paper, we propose an image conversion mechanism that inserts a virtual face image that approximates a preset similarity.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

Secure Biometric Data Utilization and Protection (바이오인식 정보의 안전한 활용 및 보호방안)

  • Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.841-852
    • /
    • 2021
  • Biometric recognition refers to a technology that identifies or verifies an individual after registering each individual's physical, physiological, and behavioral characteristics with an automated device. However, the biometric data used here corresponds to personal information since it can identify an individual. Therefore, when it is compromised or misused, it negatively affects the privacy of the data subject. In this paper, we review the current status of domestic laws related to biometric information and the status of infringements related to this. And then, some biometric application models are derived and vulnerabilities and countermeasures for each model are discussed. Finally, for the developer and service provider of the biometric system, protection guidance is presented.

Influence of Personal Information Security Vulnerabilities and Perceived Usefulness on Bank Customers' Willingness to Stay (개인정보 보안취약성과 지각된 유용성이 지속적인 은행이용의도에 미치는 영향)

  • Seo, Dong-Jin;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1577-1587
    • /
    • 2015
  • Privacy of financial customers is becoming important due to frequent leakage of personal information. Financial customers, who experience the leakage of personal information, feel threatened by their privacy and this changes customer's awareness about financial institutions or behavioral intentions. By examining the influence relation of personal information security vulnerability of the bank information system with usefulness, trust and attractiveness perceived by bank customers, this study aims to analyze the effect of each variable on bank customers' willingness to stay.

Research Trend of Biometrics (생체인식기술의 연구동향)

  • Kim, Jin-Whan;Cho, Hyuk-Gyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.824-827
    • /
    • 2005
  • The need to be able to identify other individual human beings is fundamental to the security and has been true since the beginning of human history. Physical or behavioral characteristics (finger-scan, face-scan, voice, palm, iris, retina, signature, human DNA, keystroke, vain, gait etc.) of a person are used to authenticate the person. The biometric technologies allow for a greater reliability of authentication as compared with password systems for physical access, network security, e-commerce, and so on. In this paper, we describe various technologies, market analysis, multi-modal system, standardization, privacy issue and future prospect of biometrics.

  • PDF

글로벌 인터넷사업자의 개인정보침해에 대한 규제 - 아바타 이론의 제안

  • Park, Whon-Il
    • Review of KIISC
    • /
    • v.21 no.5
    • /
    • pp.21-26
    • /
    • 2011
  • 최근 들어 인터넷사업자들이 웹상에서 제공하는 새로운 서비스가 각국의 개인정보보호 법제에 저촉되는 사례가 늘고 있다 인터넷사업자들이 국경을 넘어 정보를 수집하고 이를 가공처리, 저장하는 과정에서 본인의 동의를 얻지 않거나 개인정보를 익명처리하지 않은 것이 주로 문제가 되고 있다. 본고는 국제적으로 서비스를 하고 있는 대형 인터넷사업자가 프라이버시 침해 혐의를 받고 있는 사례를 알아보고, 무엇이 문제가 되는지 쟁점을 검토하였다. 특히 현지 감독당국이 글로벌 인터넷사업자의 위법사실을 적발하였더라도 해당 사업자가 대리인이나 분신 도구를 통하여 행동한 사실이 없으면 본사에 제게를 가할 수 없는 실정이다. 사이버공간에서는 실제 위반행위자가 없더라도 중대한 개인정보를 침해하는 결과를 가져온다면 영화 <아바타>에서와 같은 해결방법을 모색해볼 수 있다. 아바타는 독자적인 사고나 판단능력이 전혀 없지만, 나비족이 사는 낙원이 지구인에 의하여 파괴될 수 있는 상황에서 아바타와 이를 조종하는 사람들이 한 몸이 되어 나비족과 힘을 합쳐 아름다운 낙원을 지켜낸다. 즉, 인터넷사업자가 국내 실재하지 않더라도 그의 활동결과로 볼 수 있는 침해행위가 발생하고, 그 결과 회복할 수 없는 피해가 발생할 우려가 있으며, 본인과 아바타를 한 몸으로 볼 수 있다면 아바타를 통해 위법행위를 저지른 본사의 책임자를 처벌할 수 있어야 한다. 만일 그 책임자를 특정할 수 없더라도 그의 감독책임이 있는 본사 법인에 책임을 물을 수 있다고 본다. 만일 법원에서 이러한 '아바타 이론'을 수용한다면 국내에서도 외국 본사에 벌금을 과하는 등 처벌이 가능할 것이다. 다만, 해당 인터넷사업자의 반발도 만만치 않을 것이므로 주요국 개인정보 감독기구는 수사정보를 교환하는 등 국제적으로 긴밀한 협조체제를 갖출 필요가 있다.