• 제목/요약/키워드: Information protection

Search Result 4,519, Processing Time 0.027 seconds

Factors Influencing the Provision of Personal Information in Electronic Government Services (전자정부서비스에 대한 개인정보제공의 영향요인)

  • Park, Jung Ae;Son, Dal Ho
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.53-73
    • /
    • 2017
  • Frequent outbreak of intrusion of private information is occurring recently not only at portal sites but also in electronic information service of public agencies. Due to these intrusions, it is observed that the citizens tend to avoid providing their private information even to the service for public agencies. Therefore, the object of this research can be explained as demonstrating the influence of the intention of provision for private information to foster the selectronic information ervice of the public agencies. In order to achieve this, this research intends to demonstrate how the experience of the intrusion of the private information affects the concern about the privacy and how the information factor from the public electronic information service has influence on the reliability toward the public. The results showed that the experience of intrusion of privacy, awareness of the danger of privacy, and the sense protection of the information from the manager at public agencies have direct influence on the concern of privacy. Meanwhile, it has been verified that the awareness of information protection of a manager, the systemicity of information protection, and the surveillance and punishment of information protection have influence on the reliability of public agencies.

A Study on the Liability of Information Protection for the Third Party Supply of Personal Information/Focus on Fintech Companies Using OPEN APIs (개인정보의 제3자 제공시 정보보호 관련 법상 책임에 관한 연구/OPEN API 이용 핀테크 기업을 중심으로)

  • Kim, Jo-eun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.21-38
    • /
    • 2017
  • It is actively opening the market to fintech companies through open platforms, such as financial institutions and public institutions. In this thesis, we will look at the conceptual differences between the "provision of third-party information" and "entrustment" of information protection related laws, such as the Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Data Protection Etc (Network Utilization Protection Act). In addition, the legal obligation to provide information regarding the legal rights of information is considered to be relevant, whereas the legal obligation of the private information provided by the company is excessively mitigated, whereas the legal obligation of the company to provide information is excessively mitigated. In addition, I suggest self-diagnosis checklist to help fintech companies improve their privacy levels. It was found that the level of information protection was relatively insufficient compared to the consignees based on the results of a survey conducted for 31 fintech companies. Aggressive use of the checklist is suggested to raise the level of information protection for those companies.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

A Study on the Protection and Utilization of Personal Information for the Operation of Artificial Intelligence and Big Data in the Fourth Industrial Revolution (4차 산업혁명기 인공지능과 빅데이터 운용을 위한 개인정보 보호와 이용에 관한 연구)

  • Choi, Won Sang;Lee, Jong Yong;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.63-73
    • /
    • 2019
  • In the 4th Industrial Revolution, information is collected and analyzed from people and objects through the rapid development of ICT. It is possible to create value. However, there are many legal and institutional restrictions on the collection of information aimed at people.Therefore, in-depth research on the protection and use of personal information in the rapidly changing cyber security environment is needed. The purpose of this study is to protect and utilize personal information for the operation of AI (Artificial Intelligence) and big data during the 4th Industrial Revolution. It is to seek a paradigm shift. The organization of the research for this is: Chapter 1 examines the meaning of personal information during the 4th Industrial Revolution, Chapter 2 presents the framework for the review and analysis of prior research. In Chapter 3, after analyzing policies for the protection and utilization of personal information in major countries, Chapter 4 looks at the paradigm shift in personal information protection during the 4th Industrial Revolution and how to respond. Chapter 5 made some policy suggestions for the protection and utilization of personal information.

Analysis of National Critical Information Infrastructure (NCII) Protection Policy Promotion System Based on Modified Policy Model Theory (수정된 정책모형이론에 기반한 국가정보통신기반시설 보호정책 추진체계 분석)

  • Ji-yeon Yoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.347-363
    • /
    • 2024
  • As the number of cyberattacks against the National Critical Information Infrastructure (NCII) is steadily increasing, many countries are strengthening the protection of National Critical Information Infrastructure (NCII) through the enactment and revision of related policies and legal systems. Therefore, this paper selects countries such as the United States, the United Kingdom, Japan, Germany, and Australia, which have established National Critical Information Infrastructure (NCII) protection systems, and compares and analyzes the promotion system of each country's National Critical Information Infrastructure (NCII) protection policy. This paper compares the National Critical Information Infrastructure (NCII) protection system of each country with the cybersecurity system and analyzes the promotion structure. Based on the policy model theory, which is a modification of Allison's theory and Nakamura & Smallwood's theory, this paper analyzes the model of each country's promotion system from the perspective of policy-making and policy-execution. The United States, Japan, Germany, and Australia's policy-promotion model is a system-strengthening model in which both policy-making and policy-execution are organized around the protection of the National Critical Information Infrastructure (NCII), while the United Kingdom and South Korea's policy-promotion model is an execution-oriented model that focuses more on policy-execution.

Awareness and Practice of Patients' Health Information Protection of Nursing Students (간호대학생의 의료정보보호에 대한 인식도와 실천도)

  • Kim, Eun-Young;Lim, Kyoung-Suk
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.121-132
    • /
    • 2017
  • This study is a narrative research study to understand the degree of awareness and practice of nursing college students' patients' health information protection and to grasp the relationship between them.. The subjects of this study were 122 nursing college students who experienced clinical practice in two nursing colleges in GwangJu city. Data collection was done from October 13 to 28, 2017. Using SPSS/WIN 21.0 Program, descriptive statistics, t-test, one-way ANOVA and Pearson correlation analysis were performed. As a result of the study, the degree of awareness and practicability of patient' health information protection were 4.44(SD=0.44) and 4.28(SD=0.62), respectively. There was a difference in the awareness of health information protection when they were educated about patients' health information protection at school (t=5.094, p<.001) and hospital (t=2.028, p=.045) in the case of having experience in patients' health information protection in hospitals(t=2.551, p=.012). There was a significant positive(+)correlation between patient's health information protection perception and practicing degree, and the degree of health information protection practitioner's communication domain (r=.420, p<.001). There was a significant positive correlation with the domain (r=.368, p<.001) and the referral domain (r=.304, p=.001). Based on these results, we sought to protect the personal information of patients and to provide necessary basic data to develop for standardized education program.

Analysis of Stability of PV System using the Eigenvalue according to the Frequency Variation and Requirements of Frequency Protection

  • Seo, Hun-Chul;Kim, Chul-Hwan
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.480-485
    • /
    • 2012
  • Use of photovoltaic (PV) power generation system will become more widespread in the future due to anticipated cost reduction in PV technology. As the capacity of PV systems increases, a variation of power system frequency may prevent the stable output of PV system. However, the standard for the frequency protection of distributed generation in Korea Electric Power Corporation (KEPCO)'s rule does not include the setting of frequency protection. Therefore, this paper analyzes the correlation between the frequency protection requirements and the stability of grid-connected PV system for the adjustable operating setting of frequency protection. The distribution system interconnected with 3 MW PV system is modeled by Matlab/Simulink. The various values of frequency are simulated. For studied cases, the stability of PV system is analyzed. It is concluded that the setting of frequency protection is necessary to consider the stability of PV system.

Korean Firms' Intellectual Property Rights Protection Strategies to Deter Counterfeiting and Brand Piracy in Global Markets (한국기업의 해외시장에서의 위조상품 대응전략에 관한 연구)

  • Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.351-374
    • /
    • 2007
  • Recently, there has been rapid and spectacular increase in world wide counterfeiting and other forms of piracy. According to the World Customs Organization(WCO), counterfeiting accounts for 5 to 7 percent of global merchandise trade, equivalent to lost sales of as much as US$512 billion last year. Also Korean firms' damages arising from the infringement of intellectual property rights in global markets, especially in China market, are increasing. However, the existing studies on the intellectual property rights(IRP) protection have mainly focused on legal protection. Because the law is often not the best defense against theft of intellectual property rights, we must develop more effective defensive weapons for protection of IRP. Given this troublesome trend, the intention of this paper is to discuss strategic and tactical efforts, including legal protection, that can serve as proactive measures to deter counterfeiting and thus to assure the protection of Korean firms' intellectual property rights.

  • PDF

Establishment of Performance Based Design Standardization of Fire Protection Systems for High-Rise Buildings (초고층 건축물의 화재안전성능 표준화 구축)

  • Son, Bong sei
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.1
    • /
    • pp.66-74
    • /
    • 2009
  • As building heights increase, so do these challenges in Korea. High-rise buildings present a variety of challenges to fire safety and protection. The fire protection technology in our country is still on a weak situation which is mainly due to the lack of concerns by the government, companies and citizen. This paper provides general guidance regarding fire-related property protection system for high-rise building performance based design. The importance of high-rise building in of the number of occupants, the value of property, and the a catastrophic loss would have on the community all warrant an increased level of protection and life safety. Because, We have to prepare a new spacial code and standard guidance for fire protection at the stage of the high-rise building design.

  • PDF