• Title/Summary/Keyword: Information Protection Policy

검색결과 536건 처리시간 0.026초

통상환경 변화에 따른 기술무역 활성화 방안 - 지식재산권을 중심으로 - (A Study on the Activation of the Technology Trade to Changing Trade Environment - Focusing on the Intellectual Property Rights -)

  • 서갑성;김종성
    • 통상정보연구
    • /
    • 제10권2호
    • /
    • pp.165-188
    • /
    • 2008
  • Some developed countries have already long been adapted to these changes in the international economic environment would improve productivity rather than traditional technology based on more high value-added business and increased investment. IPR protection is not just a national interest in the creation and growth of dimensions beyond the country's national competitiveness and a driving force to decide whether to challenge the core of the matter. Therefore, the importance of IPR in the country to raise awareness of IPR protection, and for systematic and comprehensive policy that will continue to be prepared.

  • PDF

아동 이용자에게 특화된 온라인 개인정보보호 이슈 : 사례연구를 중심으로 (Protecting Children's Online Privacy : Privacy Issues and Its Implications)

  • 나종연;조은선;이승은
    • 디지털융복합연구
    • /
    • 제18권10호
    • /
    • pp.23-31
    • /
    • 2020
  • 최근 아동들의 온라인 활동에 대한 참여가 활발해짐에 따라 아동을 대상으로 하는 온라인 서비스 역시 빠르게 증가하고 있음에도 불구하고, 아동들은 그들의 보호받아 마땅한 권리를 충분히 보장받고 있지 못하다. 본 연구는 아동이 주로 이용하는 앱서비스를 대상으로 현황 및 사례 조사를 통해 국내 아동 개인정보보호에 관련한 이슈를 유형화하여 분석하는 것을 목적으로 한다. 이를 위해 아동의 개인정보보호에 관한 현황을 살펴보고 국내외 법제도에 근거하여 이슈를 도출했다. 연구 결과, 아동 식별의 이슈, 고지 및 동의의 실효성 이슈, 정보주체로서 아동의 권익 이슈 등이 도출되었다. 현황분석을 통해 살펴본 온라인 환경에서의 아동 개인정보 관련 내용을 바탕으로 정책적 시사점을 도출하고 개선방안 등을 제언하였다.

국가물류정보화 현황과 철도물류정보화 발전방향 (The Status of National Logistics Information System and The Future of Railway Logistics Information System)

  • 김동희;안경림
    • 대한안전경영과학회지
    • /
    • 제10권3호
    • /
    • pp.227-235
    • /
    • 2008
  • Recently, as change in global logistics environment, various issues have been presenting. These issues are including the pursuit of low cost-high added value, the realization of sustainable logistics system, the protection of environment, and the development of ubiquitous techniques. To cope with these environment changes and improve the national logistics system, the government have carried out various logistics policies and pushed ahead development of national logistics information network. But still, from a view-point of national logistics, there are several inefficient elements such as information connection and utilization, code/data standardization. In this paper, the survey result of global logistics environment change, logistics policy of a developed countries, domestic logistics policy and information system status will be presented. And from these status, suggestive points are mentioned. Finally the status of railway logistics information and future developments are presented.

빅데이터 개인정보보호 가이드라인(안)의 개선 방향에 관한 연구 (A Study on the Improvements of the Big Data Guideline in Korea)

  • 김선남;이환수
    • 정보화정책
    • /
    • 제21권4호
    • /
    • pp.20-39
    • /
    • 2014
  • 빅데이터 시대의 도래는 산업 발전에 대한 긍정적 시각과 함께 개인정보보호 및 프라이버시 침해와 관련한 우려 또한 낳고 있다. 이러한 상황에서 최근 방송통신위원회는 빅데이터 환경에서 개인정보 수집과 이용 범위를 규정하는 '빅데이터 가이드라인(안)'을 제시하였다. 그러나 동 '가이드라인(안)'은 산업 진흥에 목적을 두고 있어, 기존 "개인정보보호법"과 충돌하는 내용을 많이 포함하고 있는 상황이다. 이에 시민단체들은 정보주체의 인권이나 프라이버시를 침해할 수 있다는 이유로 제정을 강력히 반대하며, 결국 개인정보위원회는 최근 전면 재검토를 요청했다. 따라서 본 논문에서는 현 '가이드라인(안)'의 한계점을 분석하고, 국내 외 관련 법률을 검토하여, 개인정보보호를 통한 프라이버시 침해를 최소화하는 방향에서 기업들이 빅데이터를 안전하게 활용할 수 있도록 법과 제도적 정비 방안에 대해 논의한다.

e-Healthcare 환경 내 개인정보 보호 모델 (Privacy Information Protection Model in e-Healthcare Environment)

  • 김경진;홍승필
    • 인터넷정보학회논문지
    • /
    • 제10권2호
    • /
    • pp.29-40
    • /
    • 2009
  • 인터넷 등의 정보기술의 발전은 기존의 의료기술에 빠른 변화를 가져오면서 e-Healthcare가 사회적 이슈로 등장하고 있다. 의료정보화 패러다임의 새로운 전환점이라 할 수 있는 e-Healthcare는 국내에서 의료정책방안이나 기술개발을 하고 있지만, 아직 의료정보화의 기반이 되는 인프라는 부족한 수준이며 개방된 인터넷 환경 내 역공학적 측면으로 민감한 의료정보 유출 및 프라이버시 침해에 대한 문제가 대두되는 실정이다. 본 논문에서는 앞서 제시한 문제점의 해결방안으로 e-Healthcare환경 내 개인의 의료정보 보호를 위한 역할기반의 접근제어 시스템(HPIP - Health Privacy Information Protection)을 네 가지 주요 메커니즘(사용자 신분확인, 병원 권한확인, 진료기록 접근제어, 환자진단)으로 제안하였으며, 실 환경에서 효과적으로 활용될 수 있도록 프로토타이핑을 통해 그 가능성을 타진해 보았다.

  • PDF

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

낙동강하구의 생태계 현황과 관리방안 (Current Status of the Ecosystem at the Nakdong River Estuary and Management Plan)

  • 한상욱;조광진;김평범;신해선
    • 한국환경과학회지
    • /
    • 제32권12호
    • /
    • pp.943-953
    • /
    • 2023
  • This study analyzed the ecological characteristics of the wetland protection area at tthe Nakdong River through vegetation and biota surveys, which showed that brackish water meets fresh water, a unique ecological environment has been created, biodiversity is high, and diverse habitats are distributed. Eleven plant communities, including four woody communities and seven grass communities, are distributed along the coast, and a total of 514 species, including 11 endangered wildlife species, were identified in terms of species diversity. Among them, the species diversity of the Eulsuk-do area was found to be relatively higher than that of other Barreir Islands areas. The presence of a population of Sterna albifrons on Sinja-do and a population of Eremias argus on Jinwo-do, an area outside the boundaries of the wetland protection area, confirmed the conservation value of the wetlands and the need to expand the boundaries of the wetland protection area. It is judged that this information can be used as basic information for a systematic conservation and management plan for the wetland protection area at the Nakdong River Estuary and as basic data to support the establishment of a policy.

한국 버그 바운티 프로그램의 제도적인 문제점과 해결방안 (Problems and Solutions of the Korean Bug Bounty Program)

  • 박혜성;권헌영
    • 한국IT서비스학회지
    • /
    • 제18권5호
    • /
    • pp.53-70
    • /
    • 2019
  • As information security becomes more important as the fourth industrial revolution gradually emerges, an efficient and effective way to find vulnerabilities in information systems is becoming an essential requirement of information security. As the point of the protection of current information and the protection of the future industry, the Korean government has paid attention to the bug bounty, which has been recognized for its efficiency and effectiveness and has implemented through the Korea Internet Security Agency's S/W vulnerability bug bounty program. However, there are growing problems about the S/W vulnerability bug bounty program of the Korea Internet Security Agency, which has been operating for about 7 years. The purpose of this study is to identify the problems in Korean bug bounty policies through the characteristics of the bug bounty program, and to suggest the direction of the government's policy to activate the bug bounty like changes in the government's approach utilizing the market.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF