• Title/Summary/Keyword: Information Protection Law

Search Result 346, Processing Time 0.027 seconds

A study on copyright protection & utilization of bibliographic utility database (서지유틸리티 데이타베이스의 저작권 보호와 이용에 관한 연구)

  • Hong, Jae Hyeon
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.111.1-111.1
    • /
    • 1993
  • There are two types of bibliographic database, the one IS bibliographic database with creativlty. theother is bibliographic database without creativlty, The purpose of this paper is to investigate the problemsof bibliographic database with creatlvity by giving consideration of copyright law and the problems ofbihographic database w~thout creat~vity by sui genem system. Thus thls paper provided the methods thatresolve the problems of the current copyright law in order to protect all types of database being producedby way of the cooperation between the libraries and the information service centers. Secondly, this paperprovlded the legal devlces to protect bibliographic database produced by the libraries wh~ch cannot beprotected due to the lack of the creatlvity in the selection or arrangement of the material.

A study on copyright protection & utilization of bibliographic utility database (서지유틸리티 데이타베이스의 저작권 보호와 이용에 관한 연구)

  • 홍재현
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.111-143
    • /
    • 1993
  • There are two types of bibliographic database, the one IS bibliographic database with creativlty. the other is bibliographic database without creativlty, The purpose of this paper is to investigate the problems of bibliographic database with creatlvity by giving consideration of copyright law and the problems of bihographic database w~thout creat~vity by sui genem system. Thus thls paper provided the methods that resolve the problems of the current copyright law in order to protect all types of database being produced by way of the cooperation between the libraries and the information service centers. Secondly, this paper provlded the legal devlces to protect bibliographic database produced by the libraries wh~ch cannot be protected due to the lack of the creatlvity in the selection or arrangement of the material.

  • PDF

The Consideration about an Electronic Medical Record Security Standardization (전자의무기록 보안표준화에 대한 고찰)

  • Park, Doo-Hee;Song, Jae-Young;Lee, Nam-Yong
    • Journal of Information Management
    • /
    • v.36 no.1
    • /
    • pp.125-154
    • /
    • 2005
  • Due to the development of Internet and the collection and usage of the individual information, the infringements of the personal data have been increased rapidly. Regarding the personal data protection in the medical industry, it is clearly described in 'Act on Promotion of Information and Communication Network Utilization and information Protection, etc.'. the law is ratified on the basis of the service provider, therefore, it has its own limitation to be applied to medical industry. Therefore, this paper is to set the security standard and to discuss the range of legal application and considerations on its basis for the domestic medical institution at the electronic medical record system. We exemplify specific applicable content of the electronic signature in the electronic medical record also, present a security assessment item in electronic medical system and set the criteria for the security standard in the medical industry.

Factors to Affect Acceptance of Open Banking from Information Security Perspectives (정보보호 관점에서의 오픈뱅킹 수용도에 대한 영향요인)

  • Go, Jeunghyeun;Lee, Woonboo
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.63-81
    • /
    • 2021
  • Joint financial network of Korea Financial Telecommunications and Clearings Institute, which is an essential facility with a natural monopoly, maintained its closedness as monopoly/public utility model, but it has evolved in the form of open banking in order to obtain domestic fintech competitiveness in the rapidly changing digital financial ecosystem such as the acceleration of Big Blur. In accordance with digital transformation strategy of financial institutions, various ICT companies are actively participating in the financial industries, which has been exclusive to banks, through the link technology called Open API. For this reason, there has been a significant change in the financial service supply chain in which ICT companies participate as users. The level of security in the financial service supply chain is determined based on the weakest part of the individual components according to the law of minimum. In addition, there is a perceived risk of personal information and financial information leakage among the main factors that affect users' intention to accept services, and appropriate protective measures against perceived security risks can be a catalyst, which increases the acceptance of open banking. Therefore, this is a study on factors affecting the introduction of open banking to achieve financial innovation by developing an open banking security control model for financial institutions, as a protective measures to user organizations, from the perspectives of cyber financial security and customer information protection, respectively, and surveying financial security experts. It is expected, from this study, that effective information protection measures will be derived to protect the rights and interests of financial customers and will help promote open banking.

A Study on Consumer Information Needs and Education Needs according to the Consumer Problem in Information Society - Focused on E-commerce- (정보화 사회에서의 소비자문제에 따른 소비자정보요구 및 교육요구에 관한 연구 - 인터넷 상거래를 중심으로 -)

  • 류미현
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.12
    • /
    • pp.131-144
    • /
    • 2002
  • The purpose of this study was to identify the degree of experience and the consumer problem perception on its seriousness in relation to E-commerce in information society and how much consumers wanted to be provided with consumer information and education. The major findings of this study were as follows: 1. The consumers showed the highest degree of consumer information needs related to the protection of private information and the highest degree of consumer education needs related to consumerism/law/method of compensation for damages. 2. The consumers showed the highest level of anxiety at a time of e-commerce in to the total causal effect of the variables influencing consumer information needs and the variable of sex(male university students)showed the greatest total causal effect in relation to consumer education needs.

Enhance Issues of the global competitiveness of Telemedicine Industry in Korea (우리나라 원격의료산업의 글로벌 경쟁력 강화를 위한 정책 과제)

  • Yoon, Young-Han
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.325-351
    • /
    • 2011
  • This paper is focused on problem in the law and system caused by the infringement of medical information and in the law and system indicate the solution. Interests in the medical service are increasing in internet environment as life quality of the people improves because of development in information and medical technology. The current main issues of the legislative system and the law improvement suggestion for telemedicine activation which is related to the ubiquitous health in which the medicine field and IT technology convergence appearance. In particular, South Korea in the privacy-related legislation should be amended. The reason, Medical information record contains a lot of patient's private secrets. Therefore, if privacy protection is not enough this could cause problem violate a patient's privacy. Thus we need consequently the maintenance of the health medical treatment field to suit a telemedicine environment of a law system. Specifically, this law enacted to protect medical treatment information and the technical security services with confidence and stability against security treats are necessary.

  • PDF

The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users (개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로)

  • Lee, Eun Suk;Lee, Zoon Ky;Cha, Kyung Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.135-150
    • /
    • 2016
  • As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.

The survey on the use of firearms & equipment in police and the protection of citizens' rights (경찰의 총기·장구 사용과 국민의 인권보호에 대한 실태연구)

  • Jeong, Jeong-ile
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.43-54
    • /
    • 2016
  • Korea's police force has successfully performed its difficult mission of maintaining public order while overcoming difficulties at home and abroad during the past half century. However, the environment in which the forces of law a nd order operate has exponentially increased the demand for, and difficulties faced by, the agents of law enforcement in recent years because of the country's rapid globalization, as well as the move to democracy and localization, and the extensive developments in industrialization and information technology diffusion. This study also intends to investigate the appropriate limits of law enforcement and the use of force by policemen, and the general public's perception of the police as they fulfill their duty of protecting citizens' rights.

A Study on the Effectiveness of Blockchain and Legal System and Policy Tasks for SMEs (중소기업의 블록체인 적용효과와 법제도 및 정책적 과제에 대한 융합적 연구)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.14-24
    • /
    • 2019
  • It is necessary to look into multiple subjects, such as effectiveness, laws and polices of blockchain in order to easily accept blockchain technology in small and mid-sized enterprises(SME). This study analyzes the positive effects of applying the block chain to SMEs, examines the laws and policies required to apply them, and identifies the tasks. As a result, we confirmed that it can create positive effects such as optimizing supply chain management, simplifying import and export process documents, improving product quality, facilitating flow of funds, and improving transaction reliability. Also, we confirmed that it is necessary to improve the basic law of electronic transaction, electronic commerce law, electronic financial transaction law, personal information protection legislation, and needs policy supplement for platform development, education system for SMEs, transaction standardization guidelines, tax reduction policy, and block chain research and development. More extensive practical research and specific individual legal studies are needed in the future.

A Selection of an Optimal Mother Wavelet for Stator Fault Detection of AC Generator (교류 발전기 고정자 사고 검출을 위한 최적 마더 웨이브릿의 선정)

  • Park, Chul-Won
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.4
    • /
    • pp.377-382
    • /
    • 2008
  • For stator winding protection of AC generator, KCL(Kirchhoff's Current Law) is widely applied. Actually a CRDR(Current Ratio Differential Relay) based on DFT(Discrete Fourier Transform) has been used for protecting generator. It has been pointed out that defects can occur during the process of transforming a time domain signal into a frequency domain one which can lead to loss of time domain information. Wavelets techniques are proposed for the analysis of power system transients. This paper introduces an algorithm to choose a suitable Mother Wave1et for generator stator fault detection. For optimal selection, we analyzed db(Daubechies), sym(Symlets), and coif(Coiflects) of Mother Wavelet. And we compared with performance of the choice algorithm using detail coefficients energy and RMS(root mean square) error. It can be improved the reliability of the conventional DFT based CRDR. The feasibility and effectiveness of the proposed scheme is proved with simulation using collected data obtained from ATP (Alternative Transient Program) package.