• 제목/요약/키워드: Data Protection

검색결과 3,415건 처리시간 0.037초

국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구 (Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management)

  • 이성중;이영재
    • Journal of Information Technology Applications and Management
    • /
    • 제16권4호
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

일 지역 종합병원 종사자들의 환자 의료정보 보호에 관한 인식도와 실천도 (A Study on Perception and Practice of Protecting the Patient Medical Information in Some General Hospital Employees)

  • 정은영;정상진
    • 보건의료산업학회지
    • /
    • 제8권4호
    • /
    • pp.35-45
    • /
    • 2014
  • This study aimed to identify the relationship between the awareness of employees in medical institutes on the protection of medical information and their practice, and basic data of the development of a protection policy is presented. The subjects of the study were 433 employees of general hospitals located in G city and they were interviewed to ascertain their awareness of the protection of medical information and their practice level. The collected data was analysed with a t-test, a dispersion analysis, a Pearson analysis, and a multi-regression analysis. The mean scores on the awareness of protection of medical information was $4.0{\pm}0.7$, and that for the proficiency level was $3.7{\pm}0.7$. As a relevant factor for awareness and proficiency, education in medical information protection was significantly related to awareness. Education experience in medical information protection and the daily mean number of patients in hospitals had a significant relationship with scores on awareness.

보호동기이론(PMT)과 건강신념모델(HBM)을 이용한 관광객 위기대응 행동 분석: COVID-19 위기 (Examining Tourists' Behavior Using Protection Motivation Theory and Health Belief Model: Covid-19 Crisis)

  • 우은주;이상탁
    • 아태비즈니스연구
    • /
    • 제13권1호
    • /
    • pp.301-315
    • /
    • 2022
  • Purpose - The main objective of this study was to investigate tourists behavior by applying protection motivation theory and health belief model during COVID-19 pandemic. Specifically, the study examined how risk perception of COVID-19 affects tourists' protection motivation and travel avoidance intention. Design/methodology/approach - The empirical data was collected by self-administered questionnaires to obtain perception and behavior regarding COVID-19 pandemic situation. A total of 486 questionnaires were used for data analysis and SEM analysis was applied in order to examine seven hypotheses. Findings-The results showed that COVID-19 risk perception is a significant antecedent of threat appraisal, coping appraisal, and cue to action (H1, H2, H6). Moreover, protection motivation is affected by threat appraisal and coping appraisal (H3, H4) and influences on travel avoidance intention (H5). However, cue to action does not affect protection motivation (H7). Research implications or Originality - This study provides insightful implications for tourism industry practitioners who will prepare the post-corona field and the results enrich knowledge of the tourist behavior during pandemic situation.

수술실 간호사의 방사선 방어행위의 영향 요인 (Factors Affecting Radiation Protection Behaviors among Operating Room Nurses)

  • 김진;김진선;김현례
    • 성인간호학회지
    • /
    • 제28권6호
    • /
    • pp.680-690
    • /
    • 2016
  • Purpose: This study was designed to identify knowledge, attitude, environment, and self-efficacy among perioperative nurses in terms of radiation protection and to describe those factors affecting radiation protection behaviors. Methods: The sample was comprised of 128 perioperative nurses who agreed to participate in this descriptive study. Data were collected from a self-administered questionnaire and were analyzed using the t-test, analysis of variance, Mann-whitney U test, Kruskal-Wallis test, Pearson's correlation, and multiple regression analyses. Results: Radiation protection behaviors were significantly different by participant's gender, length of career as a perioperative nurse, educational level and prior experience with radiation protection education. Radiation protection behaviors were significantly correlated with radiation protection environment and self-efficacy in terms of radiation protection behaviors. In the multiple linear regression models, radiation protection environment and self-efficacy on radiation protection behaviors were statistically significant predictors of radiation protection behaviors, which accounted for 50.3% of variance in dependent variable. Conclusion: This study concluded that radiation protective environment in operating room is important to promote radiation protective behaviors and radiation safety management program to enhance self-efficacy is highly recommended.

한·미·EU의 개인정보보호 동향 및 정책에 대한 고찰 (A Study on the Privacy Protection Trends and Policies of Korea·the U.S.·EU)

  • 조세홍
    • 한국항행학회논문지
    • /
    • 제26권4호
    • /
    • pp.244-248
    • /
    • 2022
  • 최근에 사람들이 경험하고 있는 다양한 디지털 서비스는 일상 생활의 변화를 가져 오고 있고, 이러한 변화는 4차 산업혁명의 확산에 기인하고 있다. 4차 산업혁명은 정보통신 기술의 발전에 기반을 두고 있으며, ICT 기술은 필연적으로 공공데이터 활용뿐만 아니라 개인 정보의 활용과 보호라는 이슈를 발생시킨다. 이에 세계 각국은 법제정 등을 통하여 개인정보의 활용과 보호라는 서로 상충되는 쟁점을 현명하게 해결하여 신산업을 활성화를 시키고자 노력을 하고 있다. 한국, 미국, EU에서는 개인정보 보호와 활용에 있어 약간의 차이점을 보이고 있다. 우리나라에서는 데이터의 활용이 우선순위를 지닌 법 제정, 미국은 분야별로 개인정보 보호를 규율하는 개별 법률 제정, EU는 개인정보보호에 대한 강화를 명확히 하고 있다. 본 고에서는 우리나라와 미국, EU에서 개인정보보호를 어떻게 규정하고 있는지 제정된 법을 통하여 알아보고 정책에 대한 방향을 정리하고자 한다.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.

Biological assessment of streams and rivers in U.S. - design, methods, and analysis

  • Rashleigh, Brenda;Paulson, Steve;Flotemersch, Joe;Pelletier, Peg
    • Journal of Ecology and Environment
    • /
    • 제36권1호
    • /
    • pp.85-88
    • /
    • 2013
  • Bioassessment is the use of biosurvey data, most commonly for benthic macroinvertebrates and fish, to obtain information about the health of waters in a region. In rivers, bioassessment results are used to evaluate biological condition and trends, to establish relationships between stressors and impairments, and to guide and evaluate management actions.

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud

  • Hong, Hanshu;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2394-2406
    • /
    • 2016
  • ABE has become an effective tool for data protection in cloud computing. However, since users possessing the same attributes share the same private keys, there exist some malicious users exposing their private keys deliberately for illegal data sharing without being detected, which will threaten the security of the cloud system. Such issues remain in many current ABE schemes since the private keys are rarely associated with any user specific identifiers. In order to achieve user accountability as well as provide key exposure protection, in this paper, we propose a key-insulated ciphertext policy attribute based encryption with key exposure accountability (KI-CPABE-KEA). In our scheme, data receiver can decrypt the ciphertext if the attributes he owns match with the self-centric policy which is set by the data owner. Besides, a unique identifier is embedded into each user's private key. If a malicious user exposes his private key for illegal data sharing, his identity can be exactly pinpointed by system manager. The key-insulation mechanism guarantees forward and backward security when key exposure happens as well as provides efficient key updating for users in the cloud system. The higher efficiency with proved security make our KI-CPABE-KEA more appropriate for secure data sharing in cloud computing.

Fuzzy Petri-net Approach to Fault Diagnosis in Power Systems Using the Time Sequence Information of Protection System

  • Roh, Myong-Gyun;Hong, Sang-Eun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1727-1731
    • /
    • 2003
  • In this paper we proposed backward fuzzy Petri-net to diagnoses faults in power systems by using the time sequence information of protection system. As the complexity of power systems increases, especially in the case of multiple faults or incorrect operation of protective devices, fault diagnosis requires new and systematic methods to the reasoning process, which improves both its accuracy and its efficiency. The fuzzy Petri-net models of protection system are composed of the operating process of protective devices and the fault diagnosis process. Fault diagnosis model, which makes use of the nature of fuzzy Petri-net, is developed to overcome the drawbacks of methods that depend on operator knowledge. The proposed method can reduce processing time and increase accuracy when compared with the traditional methods. And also this method covers online processing of real-time data from SCADA (Supervisory Control and Data Acquisition)

  • PDF

Advanced Cathodic Protection Modeling Associated with Coating Degradation Conditions

  • Im, Gwan-Jin;Kim, Ki-Joon;Lee, Myung-Hoon
    • Corrosion Science and Technology
    • /
    • 제8권5호
    • /
    • pp.177-183
    • /
    • 2009
  • There are two effective methods in use to protect ship ballast tank against corrosion. One is paint coating and the other cathodic protection(CP). The conventional cathodic protection design has mainly relied on the expert's experience. During the last two decades computer modeling has been significantly developed as an advanced design technology for cathoidic protection systems not only for ships, but also for offshore structures. However the present computer modeling of cathodic protection systems have some limitations simulating corrosion in the ballast tank with a deteriorated coating. In this study, "coating breakdown factor" considering coating degradation states with time has been attempted to improve the cathodic protection modeling using the data from literatures.