• Title/Summary/Keyword: Information protection

Search Result 4,510, Processing Time 0.039 seconds

A Study on the Organization and Authority of the Personal Information Protection Commission (개인정보보호위원회의 조직과 권한에 관한 연구)

  • Kim, Ilhwan;Kim, Jaehyoun
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.149-156
    • /
    • 2015
  • The Personal Information Protection Commission shall be established under the direct jurisdiction of the President and shall independently perform affairs under its authority. It shall be comprised of total 15 members (5 members designated by the President, 5 members elected at the National Assembly and 5 members designated by the Chief Justice of the Supreme Court), including one minister-level Chairperson and one vice-minister-level standing member. Main functions of the Personal Information Protection Commission include deliberation and resolution of major policies and improvement of ordinances and systems related to personal information protection, coordination of opinions among public institutions in regards to the management of personal information, recommendation of improvement such as suspension of infringement by a central administrative agency, a local government and a constitutional institution, and submission of annual reports on personal information protection to the National Assembly. The function and role of the Personal Information Protection Commission regulated by the current law are insufficient in terms of independence and authorities of protection agencies compared to the international standard or level of discussion. The Commission thus cannot play a sufficient role as an independent agency for efficient protection of personal information. Therefore, there is a need for law revision that revives the purpose of the establishment of the Personal Information Protection Commission.

Prescription Management Application: Development of Pill Recognition and Dose Management System Using AI (처방전 관리 어플리케이션 : AI 를 활용한 알약 인식 및 복용 관리 시스템 개발)

  • Ju-Mi Kim;Yeon-Seo Park;Boyeon Song;Jin Yang;Sung-Wook Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.13-14
    • /
    • 2024
  • 최근 의약품 복용량의 급증으로, 효과적인 복약 관리가 중요해졌다. 의약품 복약이 제 시간에 이루지지않거나 꾸준히 이루어지지 않는 경우 효과적인 약효를 기대하기 어렵고 부작용 발생 가능성이 증가할 수 있기 때문이다. 따라서 본 연구는 AI 를 활용한 알약 인식 서비스를 통해 사용자의 편의성을 높이고, 자동 복용 알림을 제공하여 올바른 복용 습관을 장려할 수 있는 모바일 스케줄러를 개발하였다.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

Effects of Experimental Attitude and Perceived Privacy Protection on the Satisfaction and Loyalty: A Case of Unmanned Convenience Store (무인편의점 이용객의 실험태도와 개인정보보호가 만족도 및 충성도에 미치는 영향에 관한 연구)

  • Sai Wang;Tae-Woo Roh;Jin-Ho Noh
    • Korea Trade Review
    • /
    • v.46 no.4
    • /
    • pp.17-37
    • /
    • 2021
  • This study aims to examine the effects of experimental attitudes and perceived personal information protection on satisfaction and loyalty for Chinese consumers who use unmanned convenience stores. The important results of this study are as follows. First, consumers' perception of the experimental servicescape of unmanned convenience stores in China has an effect on the consumer's experimental attitude. Consumers' perception of experimental diversity in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Second, consumers' perception of the information quality of unmanned convenience stores in China has an impact on the consumer's personal information protection. Consumers' perception of the service quality of unmanned convenience stores in China has an impact on consumer's personal information protection. Third, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Fourth, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on consumer satisfaction with experiments. Consumers' perception of the experiment attitude of unmanned convenience stores in China has an effect on the consumer's satisfaction with the experiment.

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.

A Improvement Study on the Medical Information Protection Using Personal Information Management System(PIMS) : Focus on medical practitioners (개인정보보호관리체계(PIMS)를 이용한 의료정보보호 개선 방안 연구 : 의료기관 종사자를 중심으로)

  • Min, Kyeongeun;Kim, Sungjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.87-109
    • /
    • 2016
  • This study intends to present an effective and efficient development plan about the information protection of medical institutions, by establishing the improvement plan about Personal Information Management System(PIMS) appropriate to the characteristics of medical information focusing on medical institutions generating and using domestic medical information, and doing an empirical study on medical information protection plan. For this, in view of the medical characteristics of the existing Information Security Management System(ISMS), the study presented a study model appropriated to medical institutions based on Personal Information Management Systems index specialized for personal information, and through this, presented the vulnerability diagnosis and vulnerability improvement plan. Based on ISMS index, it designed an improvement index of personal information protection management about each index. The study conducted a survey for executives and employees about PIMS. Accordingly, it presented vulnerability diagnosis items of the current management system indexes from the viewpoint of the people who establish and mange the personal information protection about patients' medical information targeting executives and employees who serve at hospitals and can access medical information.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

A Study of Student Nurses' Knowledge and Awareness about Patients' Personal Information Protection (환자 개인정보 보호에 대한 학생간호사의 지식과 인식의 연구)

  • Bae, Yunjo;Lee, Soyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.36-44
    • /
    • 2016
  • This study examined the nursing student's preliminary knowledge and awareness of patient's personal information protection. 187 respondents, who were trained in 2 different nursing colleges in Kyungpook province, participated in the survey from May 18 to June 12, 2015. Using the data collected, descriptive statistics, T-test and one-way ANOVA were implemented. As a result, the student nurses, who had heard about the Personal Information Protection Act showed a significantly higher awareness score of patient's personal information protection behavior than those who did not. The respondents educated in personal information protection were reported to have a higher score of awareness about the patient's personal information protection behavior. In this regard, it is vital for university organizers to develop education associated with ethics and information security, which could enhance the perceptions of personal information protection for student nurses before their working career begins.

The Intertemporal Enforcement Strategies of Copyright Protection : An Analysis of Information Goods in the Presence of File-Sharing Networks

  • Kim, Jong-Woon
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.1-15
    • /
    • 2009
  • The paper analyzes a copyright owning firm's incentive to enforce its copyright in the presence of file-sharing networks. I devise a two-period model where a copyright owner sells two different versions of a creator's information good, and show that the firm's overall profits are enhanced by a strategy of differential inter-temporal enforcement of the copyright protection, compared to strategies of no enforcement or full enforcement in both periods. If the firm enforces no copyright protection in the first period, the low-valuation consumers may make and consume copies that are imperfect substitutes for the original information good. If there is a significant increase in the willingness-to-pay of some low-valuation consumers after they experience the information good, the firm can extract the increased consumer surplus by enforcing a positive level of copyright protection in the second period. Social welfare, however, is maximized in the case of no enforcement.

  • PDF

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.