• Title/Summary/Keyword: GDPR(General Data Protection Regulation)

Search Result 16, Processing Time 0.021 seconds

Hawkes Process based Generative Model in Mobile AD Technology (모바일 광고 기술에서 Hawkes 프로세스 기반 생성 모델에 관한 연구)

  • Hwang, Sangwon;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.504-507
    • /
    • 2019
  • 모바일 광고 기술(AD Tech)분야에서 기계학습은 사용자별 CTR(Click Through Ratio) 예측[1]에 국한되어 왔으며 2016 년도부터 시행된 GDPR(General Data Protection Regulation)[2] 정책으로 인하여 AD Tech 관련 사업자의 사용자 개인정보 접근이 제한되어왔다. 그 결과 Feature Data 에 기반한 사용자 타겟팅 및 Ad Tech 산업에서 기계 학습 기술을 적용하는데 현실적 어려움을 가져왔다. 본 논문에서는 기존 연구와 현실적 한계를 극복하기 위하여 사용자가 아닌 매체별 클릭 분포를 예측하는 Hawkes Process 에 기반한 생성모델을 제안하고 그 가능성을 살펴본다.

A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure (개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석)

  • Tae Chul Jung;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.6
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

Self-Sovereign Identity (SSI): Structured Literature Reviews with Socio-Technical Perspective (Self-Sovereign Identity (SSI: 자기주권신원) 연구 동향 분석: 사회경제, 법률, 기술적 고찰을 중심으로)

  • Son, Young Jin;Park, Min Jung;Park, Jung Suk;Hwang, Hwa Jung;Chai, Sang Mi
    • The Journal of Information Systems
    • /
    • v.30 no.4
    • /
    • pp.119-152
    • /
    • 2021
  • The concept of Self-Sovereign Identity (SSI) has emerged to overcome the limitations of traditional centralized personal identity management systems in our society. Therefore, in this study, 36 seminal researches out of 112 collected studies were investigated with a systematic literature review method to deliver a core common definition as well as the research trends on SSI in the socioeconomic, legal and technological fields. SSI studies in the legal field have mainly considered the conflicts with relevant laws such as General Data Protection Regulation (GDPR) and privacy protection laws. The study of SSI in the technology field have looked at the trends of the technical components to implement SSI and discussed the necessities of establishing standards to increase interoperability for SSI diffusion worldwide. This study ultimately derived the core definition of SSI from a various academic fields as "a trust-based personal identity management system that enables autonomous self-identification by a identity owner without a centralized system or 3rd party intervention". The results of this study contribute to the understanding of the essential SSI concept which were varied on different research fields and industries. The results also provide a foundation for discovering various SSI-based business models, applications as well as future research opportunities. Furthermore, this study suggested that SSI must be developed with interdisciplinary manner among the socioeconomic, legal, and technological fields to be practically applicable system to enable autonomous self-identification by a identity owner in our society.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.