• Title/Summary/Keyword: Information protection

Search Result 4,445, Processing Time 0.03 seconds

Effects of Experimental Attitude and Perceived Privacy Protection on the Satisfaction and Loyalty: A Case of Unmanned Convenience Store (무인편의점 이용객의 실험태도와 개인정보보호가 만족도 및 충성도에 미치는 영향에 관한 연구)

  • Sai Wang;Tae-Woo Roh;Jin-Ho Noh
    • Korea Trade Review
    • /
    • v.46 no.4
    • /
    • pp.17-37
    • /
    • 2021
  • This study aims to examine the effects of experimental attitudes and perceived personal information protection on satisfaction and loyalty for Chinese consumers who use unmanned convenience stores. The important results of this study are as follows. First, consumers' perception of the experimental servicescape of unmanned convenience stores in China has an effect on the consumer's experimental attitude. Consumers' perception of experimental diversity in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Second, consumers' perception of the information quality of unmanned convenience stores in China has an impact on the consumer's personal information protection. Consumers' perception of the service quality of unmanned convenience stores in China has an impact on consumer's personal information protection. Third, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on the consumer's experimental attitude. Fourth, consumers' perception of personal information protection in unmanned convenience stores in China has an effect on consumer satisfaction with experiments. Consumers' perception of the experiment attitude of unmanned convenience stores in China has an effect on the consumer's satisfaction with the experiment.

A Study on the Effective Countermeasures for Preventing Computer Security Incidents (기업의 침해사고 예방을 위한 관리 모델)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.107-115
    • /
    • 2012
  • The level of information protection is relatively low, in comparison with the informatisation in this country. The budget for information protection is also quite marginal at 5% of the entire information-related policy budget. The passive information protection practices by companies, which focus more on the aftermaths, lead to repeated expenses for risk management. The responses to the violation of information protection should be changed from the current aftermaths-oriented focus to prevention and early detection of possible violations. We should also realize that the response to a violation of protected information is not a responsibility of an individual but a joint responsibility of the nation and the industry. South Korea has been working towards to building a systematic foundation since 2004 when guidelines were announced regarding the information protection policy and the safety diagnosis. The current level of safety policies cannot provide a perfect protection against actual violation cases in administrative, technological and physical ways. This research evaluates the level of prevention that the current systematic protection policy offers, and discusses its limitation and possible ways for improvement. It also recommends a list effective measures for protection against information violation that companies can employ to maintain the actual target safety level.

A Improvement Study on the Medical Information Protection Using Personal Information Management System(PIMS) : Focus on medical practitioners (개인정보보호관리체계(PIMS)를 이용한 의료정보보호 개선 방안 연구 : 의료기관 종사자를 중심으로)

  • Min, Kyeongeun;Kim, Sungjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.87-109
    • /
    • 2016
  • This study intends to present an effective and efficient development plan about the information protection of medical institutions, by establishing the improvement plan about Personal Information Management System(PIMS) appropriate to the characteristics of medical information focusing on medical institutions generating and using domestic medical information, and doing an empirical study on medical information protection plan. For this, in view of the medical characteristics of the existing Information Security Management System(ISMS), the study presented a study model appropriated to medical institutions based on Personal Information Management Systems index specialized for personal information, and through this, presented the vulnerability diagnosis and vulnerability improvement plan. Based on ISMS index, it designed an improvement index of personal information protection management about each index. The study conducted a survey for executives and employees about PIMS. Accordingly, it presented vulnerability diagnosis items of the current management system indexes from the viewpoint of the people who establish and mange the personal information protection about patients' medical information targeting executives and employees who serve at hospitals and can access medical information.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

A Study of Student Nurses' Knowledge and Awareness about Patients' Personal Information Protection (환자 개인정보 보호에 대한 학생간호사의 지식과 인식의 연구)

  • Bae, Yunjo;Lee, Soyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.36-44
    • /
    • 2016
  • This study examined the nursing student's preliminary knowledge and awareness of patient's personal information protection. 187 respondents, who were trained in 2 different nursing colleges in Kyungpook province, participated in the survey from May 18 to June 12, 2015. Using the data collected, descriptive statistics, T-test and one-way ANOVA were implemented. As a result, the student nurses, who had heard about the Personal Information Protection Act showed a significantly higher awareness score of patient's personal information protection behavior than those who did not. The respondents educated in personal information protection were reported to have a higher score of awareness about the patient's personal information protection behavior. In this regard, it is vital for university organizers to develop education associated with ethics and information security, which could enhance the perceptions of personal information protection for student nurses before their working career begins.

The Intertemporal Enforcement Strategies of Copyright Protection : An Analysis of Information Goods in the Presence of File-Sharing Networks

  • Kim, Jong-Woon
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.1-15
    • /
    • 2009
  • The paper analyzes a copyright owning firm's incentive to enforce its copyright in the presence of file-sharing networks. I devise a two-period model where a copyright owner sells two different versions of a creator's information good, and show that the firm's overall profits are enhanced by a strategy of differential inter-temporal enforcement of the copyright protection, compared to strategies of no enforcement or full enforcement in both periods. If the firm enforces no copyright protection in the first period, the low-valuation consumers may make and consume copies that are imperfect substitutes for the original information good. If there is a significant increase in the willingness-to-pay of some low-valuation consumers after they experience the information good, the firm can extract the increased consumer surplus by enforcing a positive level of copyright protection in the second period. Social welfare, however, is maximized in the case of no enforcement.

  • PDF

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

Trend of Dispute on the Right to Be Forgotten and Acceptance Task of Internet Laws in Korea (잊혀질 권리의 논의 동향과 우리나라 인터넷 법제의 수용과제)

  • Chung, Sang-Ki;Kim, Kyung-Yeol
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.131-141
    • /
    • 2013
  • Matters related to the right to be forgotten started the dispute Europe to introduce it first when Data Protection Directive established in 1995 proceeded revision. Relating to this, diverse disputes proceed on responding to personal information protection and internet laws in our nation. Especially as our National Assembly submitted the law regarding the promotion of information and communication network use and protection of information and amendment of copyright, it is necessary to look into the movement on introduction of law of right to be forgotten closely in detail. EU which attempted the institutionalization for the first time, relating to review of General Data Protection Regulation, proposed opinions such as the necessity to define subjects of personal information concretely and specifically and or protection target and balanced consideration on freedom of expression which is constitutional value. In the case of our nation, there was legislation attempt to introduce the regulation but it was limited in the form of fallen effectiveness without concrete and detailed review on internet law. To solve such problems, it is necessary to look into issues and matters to be considered required to accept right to be forgotten closely and discuss possibility of introducing right to be forgotten, conflicts between fundamental rights becoming issue, effect of goal achievement of personal information protection through the system introduction, and other rational acceptance method.

A Study on Perception and Practice of Protecting the Patient Medical Information in Some General Hospital Employees (일 지역 종합병원 종사자들의 환자 의료정보 보호에 관한 인식도와 실천도)

  • Jung, Eun-Young;Jung, Sang-Jin
    • The Korean Journal of Health Service Management
    • /
    • v.8 no.4
    • /
    • pp.35-45
    • /
    • 2014
  • This study aimed to identify the relationship between the awareness of employees in medical institutes on the protection of medical information and their practice, and basic data of the development of a protection policy is presented. The subjects of the study were 433 employees of general hospitals located in G city and they were interviewed to ascertain their awareness of the protection of medical information and their practice level. The collected data was analysed with a t-test, a dispersion analysis, a Pearson analysis, and a multi-regression analysis. The mean scores on the awareness of protection of medical information was $4.0{\pm}0.7$, and that for the proficiency level was $3.7{\pm}0.7$. As a relevant factor for awareness and proficiency, education in medical information protection was significantly related to awareness. Education experience in medical information protection and the daily mean number of patients in hospitals had a significant relationship with scores on awareness.

Analysis of the recognition level of personal information protection of public institutions in the local governments (지방자치단체 공공기관의 개인정보보호에 관한 인식 수준 분석)

  • Jang, Ji-Hye;Mok, Hwa-Jung;Kim, Yeon-Seo;Choi, Jin-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.345-350
    • /
    • 2016
  • It is the personal information protection law is prepared, in the government, to develop a personal information protection basic plan has been implemented. However, year after year, complaints caused by infringement of personal information in public institutions has increased. In this paper, the recognition level of analysis related to the protection of personal information of local governments, public institutions through a questionnaire survey, raised the need for improvement.