• Title/Summary/Keyword: Information Protection Policy

Search Result 539, Processing Time 0.029 seconds

RSA Algorithm for User Authentication System

  • Song, Byung-Ho;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.207-210
    • /
    • 2003
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system, which can protect information from illegal users.

  • PDF

Compliance and Implications for Public Officials in Charge of Personal Information Protection by Policy Trends (개인정보보호 정책 동향에 따른 공공기관 담당자를 위한 업무 수행 준수사항 및 시사점)

  • Ju, Gwang-il;Choi, Seon-Hui;Park, Hark-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.461-467
    • /
    • 2017
  • Privacy laws are widely enforced throughout the general public and private sector, and the Ministry of Government Administration and Home Affairs is stepping up its annual level of protection and management levels annually. However, in actual field, it has limits to follow the laws that are amended to comply with the privacy laws of the public sector. Therefore, this study should examine the trends of privacy protection and examine items that require adherence to privacy practices in public institutions. In addition, it is hoped to draw implications for the problems arising from the task itself, as well as providing implications for the issues that are closely related to the public in the privacy of the privacy policies.

Investigate the Roles of Sanctions, Psychological Capital, and Organizational Security Resources Factors in Information Security Policy Violation

  • Ayman Hasan Asfoor;Hairoladenan kasim;Aliza Binti Abdul Latif;Fiza Binti Abdul Rahim
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.863-898
    • /
    • 2023
  • Previous studies have shown that insiders pose risks to the security of organisations' secret information. Information security policy (ISP) intentional violation can jeopardise organisations. For years, ISP violations persist despite organisations' best attempts to tackle the problem through security, education, training and awareness (SETA) programs and technology solutions. Stopping hacking attempts e.g., phishing relies on personnel's behaviour. Therefore, it is crucial to consider employee behaviour when designing strategies to protect sensitive data. In this case, organisations should also focus on improving employee behaviour on security and creating positive security perceptions. This paper investigates the role of psychological capital (PsyCap), punishment and organisational security resources in influencing employee behaviour and ultimately reducing ISP violations. The model of the proposed study has been modified to investigate the connection between self-efficacy, resilience, optimism, hope, perceived sanction severity, perceived sanction certainty, security response effectiveness, security competence and ISP violation. The sample of the study includes 364 bank employees in Jordan who participated in a survey using a self-administered questionnaire. The findings show that the proposed approach acquired an acceptable fit with the data and 17 of 25 hypotheses were confirmed to be correct. Furthermore, the variables self-efficacy, resilience, security response efficacy, and protection motivation directly influence ISP violations, while perceived sanction severity and optimism indirectly influence ISP violations through protection motivation. Additionally, hope, perceived sanction certainty, and security skills have no effect on ISP infractions that are statistically significant. Finally, self-efficacy, resiliency, optimism, hope, perceived severity of sanctions, perceived certainty of sanctions, perceived effectiveness of security responses, and security competence have a substantial influence on protection motivation.

Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Yin, Hongjian;Zhang, Leyou;Cui, Yilei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2768-2780
    • /
    • 2019
  • Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on the encrypted data. However, most of the previous schemes only focus on data confidentiality without considering data receiver privacy preserving. Recently, Li et al.(in TIIS, 10(7), 2016.7) proposed a CP-ABE with hidden access policy and testing, where they declare their scheme achieves privacy preserving for the encryptor and decryptor, and also has high decryption efficiency. Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first. It means that any adversary can obtain access policy information by a simple decisional Diffie-Hellman test (DDH-test) attack. Then we give a method to overcome this shortcoming. Security and performance analyses show that the proposed scheme not only achieves the privacy protection for users, but also has higher efficiency than the original one.

A Study on the Improvement of Information Protection Policy to Prevent the Misuse of Personal Information : Based on the Results of the Monitoring Personal Information Misuse in Financial Companies (개인정보 오남용 예방을 위한 정보보호정책 개선에 관한 연구 : 금융회사의 개인정보 오남용 모니터링 결과 중심으로)

  • Kim, Young-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1437-1446
    • /
    • 2019
  • As a result of various personal information leakage incidents, the government implemented enhanced privacy protection measures, and financial companies are making efforts to periodically check whether personal information is misused according to government measures, but the problem of misuse of personal information is still not improved. The purpose of this study is to analyze the results of field experiments using the monitoring system for misuse of personal information and to suggest ways to improve the misuse problem. Based on the specific deterrence theory, this study examined the effects of misuse prevention according to the method of dealing with misusers, and analyzed the relationship between the duties of misusers and their years of service and misuse. It is expected that the analysis results of this study will be used for effective policy establishment.

A Study on Consumer Personal Information in Information Society (정보사회에서의 소비자 개인정보보호에 관한 연구)

  • 남수정;김기옥
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.10
    • /
    • pp.55-66
    • /
    • 1999
  • The purpose of this study is to propose consumer policy related to the protection of personal information on the basis of regulations and laws in the developed countries. From this study, implications for the protection consumer privacy are discussed as follows. First, Consumer education is needed to enhance consumers'knowledge on their privacy right and this should be done not only by private consumer organization but also by businesses. Second, Businesses should realize ethical responsibilities of consumers'privacy right when they use personal information by databasemarketing. Finally, Government should establish a privacy law concerning both public and private sectors.

  • PDF

A Study on Perception and Practice of Protecting the Patient Medical Information in Some General Hospital Employees (일 지역 종합병원 종사자들의 환자 의료정보 보호에 관한 인식도와 실천도)

  • Jung, Eun-Young;Jung, Sang-Jin
    • The Korean Journal of Health Service Management
    • /
    • v.8 no.4
    • /
    • pp.35-45
    • /
    • 2014
  • This study aimed to identify the relationship between the awareness of employees in medical institutes on the protection of medical information and their practice, and basic data of the development of a protection policy is presented. The subjects of the study were 433 employees of general hospitals located in G city and they were interviewed to ascertain their awareness of the protection of medical information and their practice level. The collected data was analysed with a t-test, a dispersion analysis, a Pearson analysis, and a multi-regression analysis. The mean scores on the awareness of protection of medical information was $4.0{\pm}0.7$, and that for the proficiency level was $3.7{\pm}0.7$. As a relevant factor for awareness and proficiency, education in medical information protection was significantly related to awareness. Education experience in medical information protection and the daily mean number of patients in hospitals had a significant relationship with scores on awareness.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.