• Title/Summary/Keyword: Information Protection Policy

Search Result 532, Processing Time 0.024 seconds

A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility (주요 정보통신기반시설의 평가컨설팅 방법론에 대한 연구)

  • Lee, Young-Ro;Cho, Jae-Wan
    • Journal of Digital Convergence
    • /
    • v.5 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • It soaks but 2001 July information communication base step law enforcement and the Enforcement Ordinance are published to follow, in order to support the establishment of evaluation and protective measure in order the vulnerability analysis against the facility of the agency which manages an important information communication base hour opinion to designate information protection specialty enterprise. As information protection specialty enterprise being revealed evacuation laboratory back 12 enterprises from information communication department become designation as the consulting enterprise and they do an enterprise activity actively. It follows in diffusion of the IT and information reconciliation level the other side where our country belongs in the world-wide first group, the research against the disfunction plan of preparation comparison the fact that law it is come negligently all actuality. The network as it will give management coat fatal effect even at obstacle occurrence hour of instant for of case and IT facility of the cyber transactions which leads, in the future there to be to corporate management, there is a possibility the stable civil official of information Facilities for communications very seeing in the portion which is important. Present condition and important propulsion contents of information communication base step law enforcement after, against a vulnerability analysis of information protection relation field and evaluation consulting methodological application situation to sleep it researches from the dissertation which it sees consequently and it does.

  • PDF

A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection (아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향)

  • Kim, So-Ra;Rhee, Kee-Choon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.8
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.

A Study of Real Estate Price Change from Real Estate Policy. - An Apartment Price Center - (부동산 정책으로 인한 부동산 가격 변동에 관한 연구 - 아파트 가격 중심으로-)

  • Kim, Young-Sun
    • Management & Information Systems Review
    • /
    • v.20
    • /
    • pp.17-32
    • /
    • 2007
  • We try to study the plan to deliver the message of the hope and common peoples are diligent and we can buy the real estate in work if we make efforts hard that relieve an real estate price and analyze a timex situation. If prepared the countermeasure in the government with many real estate policy with due to a short though countermeasure which is seen at one's face. The error to the people of the policy which does not do the staring gaze to tie. This paper to pursue the stability of an real estate price and analyze the price according to an real estate policy and lead an real estate policy for a residing stability of the common people. There are we even though we grope the method to actualize and protect a lease security according to a house lease law of protection.

  • PDF

The Impact of Privacy Policy Layout on Users' Information Recognition (사용자 인지 제고를 위한 개인정보 보호정책 알림방식의 비교 연구)

  • Ko, Yumi;Choi, Jaewon;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.183-193
    • /
    • 2014
  • Korean personal data(information) protection law requires privacy policies post on every website. According to recent survey results, users' interests on these policies are low due to these policies' low readability and accessibility. This study proposes a layout that effectively conveys online privacy policy contents, and assesses its impact on information understandability, vividness, and recognition of users. Studies on privacy policies and layouts, media richness theory, social presence theory, and usability are used to develop the new layered approach. Using experiments, three major layouts are evaluated by randomly selected online users. Research results shows that information understandability, vividness, and recognition of privacy policies in the revised-layered approach are higher than those of in the text-only or table-based layouts. This study implies that employing visual guides like icons on privacy policy layouts may increase users' interest in those policies.

Applied Method of Privacy Information Protection Mechanism in e-business environments (e-Business 환경 내 개인정보 보호 메커니즘적용 방안)

  • Hong, Seng-Phil;Jang, Hyun-Me
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.51-59
    • /
    • 2008
  • As the innovative IT are being developed and applied in the e-business environment, firms are recognizing the fact that amount of customer information is providing care competitive edge. However, sensitive privacy information are abused and misused, and it is affecting the firms to require appropriate measures to protect privacy information and implement security techniques to safeguard carparate resources. This research analyzes the threat of privacy information exposure in the e-business environment, suggest the IPM-Trusted Privacy Policy Model in order to resolve the related problem, and examines 4 key mechanisms (CAM, SPM, RBAC Controller, OCM) focused on privacy protection. The model is analyzed and designed to enable access management and control by assigning user access rights based on privacy information policy and procedures in the e-business environment. Further, this research suggests practical use areas by applying TPM to CRM in e-business environment.

  • PDF

The effect of dental hygiene students' professional self-concept and ethical propensity on the willingness to performance of private patient information protection (치위생(학)과 학생들의 전문직 자아개념과 윤리적 성향이 환자 개인정보보호 실천의지에 미치는 영향)

  • Kim, Seon-Yeong
    • Journal of Korean society of Dental Hygiene
    • /
    • v.22 no.5
    • /
    • pp.443-450
    • /
    • 2022
  • Objectives: This study was conducted to investigate the effect of professional self-concept and ethical awareness of dental hygiene (department) students attending a university located in Gwangju and Jeollanam-do on patients' willingness to protect personal information. Methods: Professional self-concept, ethical disposition, and patients' personal information protection intention according to general characteristics were analyzed using t-tests and one-way ANOVA. After confirming the correlation through Pearson's correlation analysis, the effect on the patient's personal information protection intention was confirmed using multiple regression analysis. Results: Professional self-concept, ethical disposition, and the patients' willingness to protect personal information all showed positive correlations. The higher the communication skills of professional self-concept and the higher the idealism of ethical orientation, the higher the patients' willingness to protect personal information. Conclusions: This study, ascertained the effect of dental hygiene students' professional self-concept and ethical consciousness on patients' personal information protection practices. The results suggest that it is necessary to develop an educational program that can enhance the practice of dental hygienists to protect patients' personal information, and to develop and conduct continuous policy development and research.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers (개인정보보호 활동 결정요인 연구: 개인정보처리자를 중심으로)

  • Jang, Chul-Ho;Cha, Yun-Ho
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.64-76
    • /
    • 2021
  • The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.

Improvement Research for Information Protection Management System of Small and Medium Enterprises (중소기업의 정보보호 관리체계 개선방안 연구)

  • Hye-Joung Yun;Yong-Woo Lee;Hee-Doo Heo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.15-20
    • /
    • 2023
  • Recently, digitalization is accelerating in all industries, and the use of information and personal information produced and used in the process of it is very important for the success or failure of a company. However, malicious attempts to steal or leak major information and personal information of a company as an adverse effect continue to increase, and appropriate defense and response are absolutely necessary. However, in the case of small and medium-sized enterprises, the priority of information protection and the possession of professional manpower are very insufficient compared to large enterprises. This paper studies the certification and audit implemented in Korea, and suggests ways to expand the certification of the information protection system suitable for SMEs and improve the effectiveness of the support system through the expansion of the privacy law notification standard and operation of support system.

A Study on the Privacy Protection Trends and Policies of Korea·the U.S.·EU (한·미·EU의 개인정보보호 동향 및 정책에 대한 고찰)

  • Cho, Sae-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.244-248
    • /
    • 2022
  • The various digital services that people are experiencing recently are bringing about changes in the daily lives, and these changes are due to the spread of the Fourth Industrial Revolution. The 4th Industrial Revolution is based on the development of ICT technology, and ICT technology inevitably generates issues such as the use and protection of personal information as well as the use of public data. Accordingly, countries around the world are making efforts to revitalize new industries by wisely solving conflicting issues between the use and protection of personal information through legislation. There are some differences in the protection and use of personal information in Korea, the United States, and the EU. Korea trys to make the legislation that prioritizes the use of data, and the United States establishes individual laws governing the protection of personal information by sector, while the EU has clarified the strengthening personal information protection. This paper aims to find out how personal information protection is defined in Korea, the United States, and the EU through enacted laws and organize the direction of the future policies.