• Title/Summary/Keyword: Personal Data

Search Result 5,450, Processing Time 0.03 seconds

The Situation Lens: A Metaphor for Personal Task Management on Mobile Devices

  • Celentano, Augusto;Faralli, Stefano;Pittarello, Fabio
    • Journal of Computing Science and Engineering
    • /
    • v.3 no.4
    • /
    • pp.238-259
    • /
    • 2009
  • In this paper we discuss personal data management with mobile devices, an activity requiring the composition of services offered by standard suites of applications. We propose a data model and an interface model that allows users to define activities, tasks and services, to navigate among them according to the evolution of the personal situation as perceived and interpreted by the users themselves. The interface model acts as a lens exploring the situation, zooming into the details, covering different areas of the personal data, supporting the user in the role of a composer of personal services.

A Study on Strengthening Personal Information Sovereignty through Analysis of Domestic Service Cases and Research Projects of Self-Sovereign Identity Technology (자기주권신원기술의 국내 서비스 사례 및 연구 과제 분석을 통한 개인정보 주권 강화 방안연구)

  • Lee, Jeong-Hyeon;Kim, Ji-Won;Kim, Chul-Soo;Yang, Jin-hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.575-589
    • /
    • 2020
  • Along with the exponential growth of data businesses, the importance of data containing personal information of use have also increaseing. Particularly, in Korea, as the Data 3 Act was implemented, companies can use personal information more actively through regulatory improvement and stipulation in case of using data containing personal information. In this situation as per the service use, self-sovereign identity technology has emerged that can minimize the provision of personal information in relation to real name authentication and provision of personal information. Recently, services and studies using blockchain have been actively conducted in case of using the self-sovereign identity function for clarity and verification of records according to the use of personal information. In this thesis, by analyzing the characteristics of domestic self-sovereign identity service and the current status and contents of research related to blockchain-based self-sovereign identity technology and we suggest a research direction based on self-sovereign identity technology to reinforce the sovereignty of personal information in the era of the 3rd Data Act do.

Design of Open Gateway Framework for Personalized Healing Data Access (개인화된 힐링 데이터 접근을 위한 개방형 게이트웨이 프레임워크 설계)

  • Jeon, YoungJun;Im, SeokJin;Hwang, HeeJoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.229-235
    • /
    • 2015
  • ICT healing platform is based on bio-signal and life habit information target to alarm early sickness concept prevention chronic pain. ICT(Information & Communication Technology) healing platform target on personal lead health management care of several health agencies and open of the (hospital, fitness center, health examination center, personal health device) personal health information together to personal device. Support Analysis Platform and Open API to vitalization optional services. In this paper proposal to access personality healing data Open Gateway Framework of Healing Platform Adaptor (HPAdaptor) ICT healing platform means Data relaying link to EMR(Electronic health record), korean medicine, life log, wellness, chronic pain, and fineness several personal health data provider and service provider personal healing data with software engine. After Design HPAdaptor can use for data and service provider record storage, mobile platform and analytics platform need data service or platform relying reference model.

Issues of Harmonization of ISO 9001 Standard and the Law 09-08. Protection of Personal Data in Morocco: Potentials and Risks

  • Adil CHEBIR ;Ibtissam EL MOURY;Adil ECHCHELH;Omar TAOUAB
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.57-66
    • /
    • 2023
  • Since 2009, Morocco has had a law governing the processing of personal data, the law 09-08, and a supervisory authority, the CNDP (National Commission for the Protection of Personal Data). Since May 2018, the European General Regulation on the Protection of Personal Data (GDPR) entered into force, which applies outside the EU in certain cases and therefore to certain Moroccan companies. The question of the protection of personal data is primarily addressed to the customer. The latter may not only be a victim of crime linked to ICT, but also have to face risks linked to the collection and abusive processing of his personal data by the private and public sectors. Often the customer does not really know how their data is stored, nor for how long and for what purpose. This fact raises the question of satisfying customer requirements, in particular for organizations that have adopted a quality approach based on ISO 9001 standard.In order to master these constraints, Moroccan companies have to adopt strategies based on modern quality management techniques, especially the adoption of principles issued from the international standard ISO 9001 while being confirmed by the law 09-08. It is through ISO 9001 and the law 09-08 that these companies can refer to recognized approaches in terms of quality and compliance. The major challenge for these companies is to have a Quality approach that allows the coexistence between the law 09-08 and ISO 9001 standard and this article deals within this specific context.

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

Construction of a Digitally Represented Person by Personal Data: A Multidimensional Framework from an Inforg Perspective

  • Jinyoung Min;HanByeol Stella Choi;Chanhee Kwak;Junyeong Lee
    • Asia pacific journal of information systems
    • /
    • v.34 no.1
    • /
    • pp.292-320
    • /
    • 2024
  • The amount of data a related to a person is so substantial that it appears that a digital version of them can be built thereon. They are usually handled as personal information, and the attempts made to understand personal information have led to bundling and unbundling of various data, yielding numerous fragmented categories of personal information. Therefore, we attempt to construct a generalizable lens for a deeper understanding of person-related data. We develop a theoretical framework that provides a fundamental method to understand these data as an entity of a digitally represented person based on literature review as well as the concepts of inforg and infosphere. The proposed framework suggests person-related data consist of three informational inforg dimensions that can preserve the archetype of a person, form, content, and interaction. Subsequently, the framework is examined and tested through several analyses in two different contexts: social media and online shopping mall. This framework demonstrates the suggested dimensions are interrelated with certain patterns, the prominent dimension can determine the data characteristics, and the dimensional composition of data types can imply the characteristics of the digitally represented person in certain contexts.

Keywords Analysis on the Personal Information Protection Act: Focusing on South Korea, the European Union and the United States

  • Park, Sung-Uk;Park, Moon-Soo;Park, Soo-Hyun;Yun, Young-Mi
    • Asian Journal of Innovation and Policy
    • /
    • v.9 no.3
    • /
    • pp.339-359
    • /
    • 2020
  • The policy change in the Data 3 Act is one of the issues that should be noted at a time when non-face-to-face business strategies become important after COVID-19. The Data 3 Act was implemented in South Korea on August 5, 2020, calling 'Big Data 3 Act' and 'Data Economy 3 Act,' and so personal information that was not able to identify a particular individual could be utilized without the consent of the individual. With the implementation of the Data 3 Act, it is possible to establish a fair economic ecosystem by ensuring fair access to data and various uses. In this paper, the law on the protection of personal information, which is the core of the Data 3 Act, was compared around Korea, the European Union and the United States, and the implications were derived through network analysis of keywords.

The Effects of Characteristics for Household Management and Attitudes toward Household Management on Wives' Personal Expenses (가계관리특성 및 가계관리에 대한 태도가 「부인의 용돈」에 미치는 영향)

  • Lee, Su-Jin
    • Journal of the Korean Home Economics Association
    • /
    • v.50 no.4
    • /
    • pp.89-102
    • /
    • 2012
  • The purpose of this study was to demonstrate the effects of "characteristics for household management" and "attitudes toward household management" on wives' personal expenses. The data were obtained from the F-GENS Korea Panel Survey of Ochanomizu University. The responses were gathered from married people in Seoul and its surrounding metropolitan area. The sample for this study was comprised of 473 married women. ANOVA and multiple-regression models were used to analyze the data. The results are summarized below. First, 13.5 percent of the respondents have zero personal expenses. Second, the personal expenses among the wives differed depending on their annual average income levels. Also, their personal expenses differed based on their type of employment. Third, the "expenditure ratio for family" and "expenditure ratio for children" negatively affected their personal expenses. Fourth, the women who had responsibility for the management of their households had lower personal expenses than the others.

Blockchain-based safety MyData Service Model (블록체인 기반 안전한 마이데이터 서비스 모델)

  • Lee, Kwang Hyoung;Jung, Young Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.873-879
    • /
    • 2020
  • The importance of data as a core resource of the 4th industrial revolution is emerging, and companies illegally collect and use personal data. In the financial sector, active research is conducted to safely manage personal data and provide better services using blockchain, big data, and AI technology. In this paper, we propose a system that can safely manage personal data by using blockchain technology, which can be used without changing the existing system. The composition of this system consists of a blockchain, blockchain linkages, a service provider, and a user (i.e., an app). Blockchain can be used regardless of its type and form, and services are provided by classifying blockchains and services in the blockchain linkages. Service providers can access personal data only after requesting and receiving delegated permission from users. Existent MyData services store all data in a user's mobile phone, so information may get leaked due to jailbreaks or rooting. But in the proposed system, personal data are stored in blockchain so information leakage can be prevented. In the future, we will study ways to provide customized services using personal data stored in blockchain.

Strategy for Establishing a Rights Processing Platform to Enhance the Utilization of Open Data (공공데이터 활용성 제고를 위한 권리처리 플랫폼 구축 전략)

  • Sim, Junbo;Kwon, Hun-yeong
    • Journal of Information Technology Services
    • /
    • v.21 no.3
    • /
    • pp.27-42
    • /
    • 2022
  • Open Data is an essential resource for the data industry. 'Act On Promotion Of The Provision And Use Of Public Data', enacted on July 30, 2013, mandates public institutions to manage the quality of Open Data and provide it to the public. Via such a legislation, the legal basis for the public to Open Data is prepared. Furthermore, public institutions are prohibited from developing and providing open data services that are duplicated or similar to those of the private sector, and private start-ups using open data are supported. However, as the demand for Open Data gradually increases, the cases of refusal to provide or interruption of Open Data held by public institutions are also increasing. Accordingly, the 'Open Data Mediation Committee' is established and operated so that the right to use data can be rescued through a simple dispute mediation procedure rather than complicated administrative litigation. The main issues dealt with in dispute settlement so far are usually the rights of third parties, such as open data including personal information, private information such as trade secrets, and copyrights. Plus, non-open data cannot be provided without the consent of the information subject. Rather than processing non-open data into open data through de-identification processing, positive results can be expected if consent is provided through active rights processing of the personal information subject. Not only can the Public Mydata Service be used by the information subject, but Open Data applicants will also be able to secure higher quality Open Data, which will have a positive impact on fostering the private data industry. This study derives a plan to establish a rights processing platform to enhance the usability of Open Data, including private information such as personal information, trade secrets, and copyright, which have become an issue when providing Open Data since 2014. With that, the proposals in this study are expected to serve as a stepping stone to revitalize private start-ups through the use of wide Open Data and improve public convenience through Public MyData services of information subjects.