• Title/Summary/Keyword: 프라이버시 보호

Search Result 885, Processing Time 0.026 seconds

A Thought on the Right to Be Forgotten Articulated in the European Commission's Proposal for General Data Protection Regulation (유럽연합(EU) 정보보호법(General Data Protection Regulation)개정안상의 잊혀질 권리와 현행 우리 법의 규율 체계 및 앞으로의 입법방향에 관한 소고)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.87-92
    • /
    • 2012
  • In the early 2012, European Union proposed new legal framework, including the right to be forgotten, for the protection of personal data. The new Proposal articulates kind of sweeping new privacy right and there has been debates on its potential threat to free speech in the digital age. While the situation is similar in Korea, I want to introduce the right to be forgotten in the Proposal. Then, I will analyze current legal system in Korea regarding the new privacy right and suggest some guidelines in searching direction for the coming legislation with respect to the right to be forgotten. The right to be forgotten should not have been promulgated without considering fully its effect on the free speech, especially in the society where the voice toward direct democracy or movement toward participation of the citizen, mainly through cyber space or Social Network Services, has risen much higher in Korea. Especially, the new right seems not to cover the control of data subject on a third party where the third party expressing his opinion by posting himself other's personal data on his blog or others.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

A Study on the Development of Remodeling (plan) by Deriving Temporary House Improvements (임시주거용 조립주택 개선사항 도출을 통한 리모델링(안) 개발 연구)

  • Lee, Ji-Hyang;Son, Myung-Chan;Kwon, Jin-Suk;Park, Sang-Hyun;Won, Jin-Yung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.2
    • /
    • pp.301-311
    • /
    • 2019
  • Purpose and Method: In this study, a questionnaire interview survey was conducted for the victims living in the temporary house by the Pohang earthquake, and improvements were derived. Results: As a result, major improvements in terms of facilities are as follows. First, in order to expand the toilet and cooking space, the existing inner gate and the wall are removed and the width of the toilet is expanded. Minimize the inconvenience by adding a cooking table as wide as the extended toilet. Second, a separate sleep compartment is set up to secure storage space in a limited area. And the storage closet is installed below and used as a storage space. At this time, the size of the sleeping space is set to double bed size. Third, curtains and blinds are installed on both windows to secure privacy, thereby protecting privacy and psychological stability. Conclusion: If the remodeling of the temporary house proposed in this study is utilized and applied, it is possible to provide a better living environment. In addition, it is expected that it will be possible to improve the efficiency of space and overcome existing spatial limitations by minimizing inconveniences reflecting the needs of the victims.

A Study for the Establishment of Appropriate Facilities Criteria of the Korean Welfare Devices Center (한국형 복지용구사업소의 적정 시설기준 수립을 위한 기초 연구)

  • Chin, Young Ran;Bae, Joa Sup;Chung, Jae Wook;Lee, Hyo Young
    • 한국노년학
    • /
    • v.30 no.4
    • /
    • pp.1163-1177
    • /
    • 2010
  • This study was conducted to establish the appropriate facilities criteria of the Korean welfare devices center. We e-mail surveyed 194 welfare devices centers and analysed 13 blueprints of them. We established the following proper principles of facilities. First, consist type and area of room should depend on the type of welfare devices centers. Second, The flow of human and welfare devices should be simple. Third, the area calculated on the base of intent of center owner and the size of beds, wheelchairs, etc. Fourth, exhibit room facing with roadside may obtain advertising effect. Fifth, the storage and disinfecting room should use different entrance, and avoid the intersection of flow to prevent cross-contamination. Sixth, the access road to the exhibition and consulting room should be able to approach by the wheelchair. seventh, office room should be invisible to keep customer's privacy. Direct Cleaning-disinfecting type center on the premise that the maximum 165m2, middle 150m2, intermediate 140m2, display at least Consultation, Cleaning-disinfecting room, storage (clean, contaminated), the office, equipped with a parking space. Entrust Cleaning-disinfecting type center on the premise that a maximum 134m2, middle 119m2, intermediate 109m2 exhibited minimal activity room, consultation room, office, equipped with a parking space, collecting welfare when importing equipment warehouse (clean, pollution) have been proposed to equip up to.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.