• Title/Summary/Keyword: Information protection

Search Result 4,519, Processing Time 0.189 seconds

A Study on the Privacy Protection Trends and Policies of Korea·the U.S.·EU (한·미·EU의 개인정보보호 동향 및 정책에 대한 고찰)

  • Cho, Sae-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.244-248
    • /
    • 2022
  • The various digital services that people are experiencing recently are bringing about changes in the daily lives, and these changes are due to the spread of the Fourth Industrial Revolution. The 4th Industrial Revolution is based on the development of ICT technology, and ICT technology inevitably generates issues such as the use and protection of personal information as well as the use of public data. Accordingly, countries around the world are making efforts to revitalize new industries by wisely solving conflicting issues between the use and protection of personal information through legislation. There are some differences in the protection and use of personal information in Korea, the United States, and the EU. Korea trys to make the legislation that prioritizes the use of data, and the United States establishes individual laws governing the protection of personal information by sector, while the EU has clarified the strengthening personal information protection. This paper aims to find out how personal information protection is defined in Korea, the United States, and the EU through enacted laws and organize the direction of the future policies.

Agent-based Colored Petri Net Modeling of Grid Information Flows : Modeling of Wide Area Protection System (에이전트 기반 컬러 페트리 넷을 이용한 전력 계통의 정보 흐름 모델링: 광역 보호 시스템에의 적용)

  • Park, Byung-Sung;Hur, Kyeon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.7
    • /
    • pp.1347-1353
    • /
    • 2011
  • While most of the existing protection schemes have been designed with local information around individual components, these local schemes are not considered capable of protecting the modern electric power gird with growing complexity. Recent blackouts in North America and Europe have renewed the emphasis on coordinated protection and control actions to avoid systemwide blackouts, utilizing all of the available grid information. Thus, this paper proposes a new methodology, Agent-based Colored Petri Net (ACPN) modeling for systematically representing, modeling and analyzing information flows and interactions among the entities of the electric power grid. The paper demonstrates its efficacy and accuracy by investigating an ACPN model of a wide area protection system for a typical power grid. The proposed modeling and analysis schemes may further provide a framework to help assure reliability and interoperability of diverse smart grid components.

A Role-play Approach for Privacy Protection Inspiration of Elementary Students

  • Park, Gwi-Ja;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.12
    • /
    • pp.1796-1808
    • /
    • 2009
  • Elementary school students have a little awareness of privacy protection since they do not have many opportunities for systematic education on information and communication ethics. Hence, they are likely to expose their own information to others and sometimes bring on a lot of misuses by using others' information. In this paper, we provide an idea for teaching and learning methods which the elementary school students acquire privacy protection and management methods and raise their practical capabilities. We develop a role play teaching and learning model in connection with various Information and Communication Technology (ICT) activities and establish the instruction plans. Moreover, we apply them to the actual classes at grade five and six of the elementary school students respectively, and finally analyze the results. The proposed teaching and learning method shows that the students participated in a series of learning activities have higher learning effects on awareness of privacy protection than those learned with the conventional methods.

  • PDF

A Study on Establishing Guidelines for Information Protection and Security for Educational Institutes (학내 정보보호지침 수립에 관한 연구)

  • Yu, Ki-Hun;Choi, Woong-Chul;Kim, Shin-Kon;Goo, Chun-Yul
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Because IT security guidelines for universities and colleges mostly focus on hardware aspects, the problems such as security incidents by a user's mistake and personal information leakage by hacking are serious in our higher educational institutes. In order to solve these information protection and security problems in the educational institutes, realizable and implementable information protection and security guidelines which will contribute to escalate information protection level should be established and at the same time, specific guidelines should be provided to make the guidelines efficient. In this paper, the information security problems and cases are categorized to develop information security guidelines for the higher educational institutes in terms of short, mid, and long term aspects and the solutions to the problems are sought. In addition, a serious of approaches to the information security are proposed such as the improvement measures for the employees of the institute to have desirable security-minded, security problem prevention and resolving methods, developing conflict coordination procedure and law and regulation system establishment for making the educational institutes be information-oriented.

An Analysis of Linguistic Characteristics of Information Protection Policies to Improve the Effectiveness of Information Protection in Cloud Computing Services (클라우드 컴퓨팅 서비스의 정보보호 실효성 증진을 위한 정보보호 정책의 언어적 특성 분석)

  • Jeong, Eun-Han;Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.15-23
    • /
    • 2020
  • It is a reality that users do not know well what kind of information protection policy the cloud service provider presents to consumers. The purpose of this study is to find a way to improve the effectiveness of information protection by analyzing the content and linguistic characteristics of information protection policies provided by cloud service providers. In order to achieve the purpose of this study, we investigate the contents of information protection policies of 47 companies that provide cloud services and analyze the influence of linguistic characteristics to come up with a plan to increase the efficiency of cloud services. The research results showed that low readability due to comprehensive expression of technical processing methods, etc., could lead to legal disputes and to hinder the spread of cloud services. The research results can increase the effectiveness of information protection by suggesting items to be provided to users.ing, Privacy, confidentiality, linguistic characteristics, Accounting Information.

A Study on the Security Requirements for Developing Protection Profiles (보호프로파일 개발을 위한 보안요구사항 도출 방법에 관한 연구)

  • Zheng, He;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.133-138
    • /
    • 2007
  • As a formal document that expresses a set of security requirements for IT products that meets specific consumer needs in the ISO/IEC 15408(CC, Common Criteria) evaluation, protection profiles are developing by many national agencies and companies recently. Since a protection profile is a criteria for security evaluation when the IT systems and products are introduced, the importance of the protection profile is increasing. However, developing protection profiles are still difficult due to lack of detailed methodology and guidance to analyze security environments or to derive security requirements. In this paper, we analyze foreign instances of developing protection profiles and propose a methodology for deriving security requirements through analyzing the TOE security environment.

Research a Study on Awareness and Practice of Personal Information Protection in Students (대학생들의 개인정보 보호인식과 실천에 대한 인지도 조사연구)

  • Lee, Hye-Seung;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.53-67
    • /
    • 2019
  • This study is expected to be of significance in that it attempted to examine the personal information protection awareness of college students and the state of their personal information protection as prospective information processors and private information owners to boost their will to put private information protection in practice. As a result of making an analysis, the most common average time that the students spent in doing every online activity on weekdays was fewer than two or three hours, and the most dominant activities that they did over the Internet were for entertainment or hobbies. As for awareness of the nature of the Internet, they looked upon it as a quite open public space. Regarding the state of private information protection, they thought that changing passwords on a regular basis would be beneficial to personal information protection, and many thought that it's needed to withdraw from or shut down web sites that weren't used for a long time. In terms of actual practice, however, they didn't change their e-mail passwords regularly on the grounds that it's a hassle, and even the students who had experience of personal information leakage didn't report it or didn't ask for counsel on the grounds that they didn't want to be bothered as well. The majority of the students weren't cognizant of how to report or seek counsel. In the future, personal information protection should be educated on a continual basis as part of curriculum to raise awareness of it among students and boost their will to practice it with a sense of responsibility in an effort to prevent the occurrence of collateral damages triggered by personal information leakage.

Clinical Information Protection Behavior in a Medical Institution : Based on Health Psychology Theories (의료기관 종사자의 진료정보 보호행위분석: 건강심리이론관점을 중심으로)

  • Son, Mi-Jung;Yoon, Tai-Young;Lee, Sang-Chul
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.2
    • /
    • pp.153-163
    • /
    • 2014
  • Purpose: This research aims to find out clinical information protection behavior within a medical institution in mandatory circumstance based on health psychology theories Methods: This research has developed the survey based on the variables from ealth psychology theories; and conducted the survey during the whole month in April 2013. In the end, 256 samples have been used for this research's analysis. Results: First of all, Empirical results has proved that perceived benefits, self-efficacy, and cues to action have an positive influence on clinical information protection behavior. Perceived barriers has an negative influence. Finally, it has proven from the research that perceived severity and perceived susceptibility do not have an impact on clinical inf ormation protection behavior Conclusion: These findings provide an enriched understanding about medical institution workers information protection behavior on patient's clinical information.

Development of Protection Method for Power System interconnected with Distributed Generation using Distance Relay

  • Kim, Ji-Soo;Cho, Gyu-Jung;Song, Jin-Sol;Shin, Jae-Yun;Kim, Dong-Hyun;Kim, Chul-Hwan
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2196-2202
    • /
    • 2018
  • The conventional power system allowed only downstream power flow. Therefore, even if a fault occurs, only the forward current flow is considered. However, with the interest in distributed generation (DG), DGs such as Photovoltaic (PV), Wind Turbine (WT) are being connected to a power system. DGs have many advantages, but they also have disadvantage such as generation of reverse flow. Reverse flow can severely disrupt existing protection systems that only consider downstream power flow. The major problems that may arise from reverse power flow are blinding protection and sympathetic tripping. In order to solve such problems, the methods of installing a directional relay or a fault current limiter is proposed. However, this method is inconceivable because of the economics shortage. Therefore, in this paper, a distance relay installed in existing power system is used to solve the protection problem. Modeling of distance relay has been carried out using ElectroMagnetic Transients Program (EMTP), and it has been verified through simulations that the above problems can be solved by a distance relay.

A Study of Optimizing Cathodic Protection in Comparison of Design Methodologies

  • Choi, Young-Kwan;Choi, Sang-Yule;Shin, Myong-Chul
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.11
    • /
    • pp.23-29
    • /
    • 2010
  • The principal factor determining an optimum design method for cathodic protection is finding the protection current for preventing the corrosion of existing, already laid pipe. Some factors currently used to test designs include the sizes and lengths of pipes, soil resistivity, and the coating damage rate. We believe this method and current formulae are not optimum due to the uncertainty of determining the coating damage rate and the corrosion protection current's density. This paper analyzes the amount of protection current obtained by performing a temporary current test using data describing existing laid pipe. We then propose determining the corrosion protection current by using the temporary current test after modifying the formula. In addition, we suggest a way to choose optimized cathodic protection and the process of design by executing the design and taking account of such factors as a site condition of 34km-long non-protected water supply pipe lines (stages I and II) in ${\bigcirc}{\bigcirc}$ region, climate, interferences, and durability.