• Title/Summary/Keyword: Personal Data Management

Search Result 1,511, Processing Time 0.026 seconds

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

Personal Information Management System with Blockchain Using zk-SNARK (영지식 증명을 활용한 블록체인 기반 개인정보 관리 기법)

  • Lee, Jeong-hyuk;Hwang, Jung Yeon;Oh, Hyun-ok;Kim, Ji-hye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.299-308
    • /
    • 2019
  • As the utilization value of personal information becomes higher, discussions about providing personal information are being conducted actively. One of the most common methods of providing personal information is that a group obtains a personal information with a consent of individual. However, the above method has 2 problems. First, more information is exposed than the information required by organization for utilization of personal information. Second, trusted party should provide organization with an authentication of personal information whenever they require personal information. To solve these problems, we propose a personal information management system with blockchain using zk-SNARK(zero-knowledge Succinct Non-interactive ARgument of Knowledge) for privacy. Our proposal enables individuals to guarantee reliability of their information and protect their privacy concurrently using zk-SNARK when they provid organization with their personal information. In addition, it is possible to manage the personal information data while ensuring the integrity of the data using blockchain and it is possible to share the personal information more conveniently than existing systems.

Application of Personal Digital Assistant (PDA) for Mobile Bridge Management System (MBMS) (PDA를 이용한 무선교량유지관리(MBMS) Application 개발)

  • 이태식;이동욱;이성현
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.3
    • /
    • pp.223-231
    • /
    • 2004
  • The accumulated BMS data have made it easy to make reasonable decision-making for bride maintenance and repair work. In the developing period of BMS, the bridge management was not easy due to the lack of understanding of BMS and low credibility of the data. In recent years, it has been possible to enhance the credibility of the data and to expand the application scopes of BMS with the efforts of Local Road Construction Offices. The reasonable decision making for bridge management can improve the performance of bridges under the practical constraints such as limited budget. It can then result in the reduction of bridge maintenance budget. This study provides the methodology for the application of mobile internet-based KOBMS for bridge management. The data flow for BMS is the most important factor for decision-making on budget allocation, and this study establishes the basic scheme of the data flow for BMS. The implementation of PDA for BMS may suggest a new paradigm of 'Mobile' in the field of construction management.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management (국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구)

  • Lee, Sung-Joong;Lee, Young-Jai
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

A Study on Developing the Compliance for Infringement Response and Risk Management of Personal Information to Realize the Safe Artificial Intelligence Services in Artificial Intelligence Society (지능정보사회의 안전한 인공지능 서비스 구현을 위한 개인정보 침해대응 및 위기관리 컴플라이언스 개발에 관한 연구)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.1-14
    • /
    • 2022
  • This study tried to suggest crisis management compliance to prevent personal information infringement accidents that may occur in the process because the data including personal information is being processed in the artificial intelligence (AI) service process. To this end, first, the AI service provision process is divided into 3 processes such as service planning/data design and collection process, data pre-processing and purification process, and algorithm development and utilization process. And 3 processes are subdivided into 9 stages following to personal information processing stages to infringe personal information. All processes were investigated with literature and experts' Delphi. Second, the investigated personal information infringement factors were selected through FGI, Delphi, etc. for experts. Third, a survey was conducted with experts on the severity and possibility of each personal information infringement factor, and the validity and adequacy of the 94 responses were verified. Fourth, to present appropriate risk management compliance for personal information infringement factors in AI services, a method for calculating the risk level of personal information infringement is prepared by utilizing the asset value of personal information, personal information infringement factors, and the possibility of infringement accidents. Through this, the countermeasures for personal information infringement incidents were suggested according to the scored risk level.

Growth and Motivations for Chinese Mobile Payment Service: An Empirical Study Using Ali-Pay and Wechat-Pay Users in Chinese Market (중국 모바일 결제서비스의 발전과 사용동기 - 중국 모바일 결제서비스 알리페이, 위챗페이를 중심으로 -)

  • Yin, Changlong;Lee, Sae-Bom;Roh, In-Sung;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.1
    • /
    • pp.139-152
    • /
    • 2017
  • Purpose: The purpose of this study is how Chinese users' personal traits affect the intention to use mobile payment. This research selects personal innovativeness and habit of cash payment as personal traits, and considers perceived risks and relative advantage as personal beliefs. In addition, the research divided perceived risks into three multi-faceted risks, which are privacy risk, financial risk and performance risk. Methods: The method of this study used questionnaire survey to collect 241 data on users' perception on mobile payment, and also used a structural equation modeling method. Results: The result of this paper shows that all hypotheses are statistically significant except 4 hypotheses. Conclusion: The result of this study found that personal innovativeness is negatively related with all 3 kinds of perceived risks as anticipated. And Chinese users' traditional habit of cash payment negatively affects intention to use mobile payment but is not statistically significant affecting three perceived risks. Among perceived risks, privacy risk is the most negatively influencing factor to relative advantage.

Multi-Mediation Effects of Personal Self-Congruity and Social Self-Congruity to Perceived Value and Brand Attitude on Chinese Airlines Customers

  • WU, Xuan-Wen;KIM, Moon-Hong
    • Journal of Distribution Science
    • /
    • v.18 no.1
    • /
    • pp.35-45
    • /
    • 2020
  • Purpose- This study examines the multi-mediation effect of personal self-congruity and social self-congruity to perceived value and brand attitude on aircraft customers in China. Research design, data and methodology- Survey was conducted on Chinese citizens who had flown via Chinese airlines and lived mainly in the Yangtze River delta. 727 cases were analyzed. SPSS 22.0 and AMOS 24.0 were used to analyze the data. Results - First, perceived economic value has a positive impact on personal self-congruity and social self-congruity but has no effect on brand attitude. Second, perceived functional value has a positive impact on personal self-congruity, social self-congruity, and brand attitude. Third, based on this, perceived economic value is not directly related to brand attitude. However, there is a relationship between perceived functional value and brand attitude, with personal self-congruity and social self-congruity having mediation effects. Conclusions - The Results show that perceived economic and functional value such as competitive airfare, mileage membership, check-in processes, diversified vouchers and coupons, and also basic services such as flight security and flight attendant service having an effect on personal self-congruity. To improve consumer brand attitude, airlines should take into consideration personal self-congruity factors such as their values and lifestyles, and their social self-congruity factors such as their social status and social security.

Analysis of Articles published in the Korean Journal of Thoracic and Cardiovascular Surgery - Use of personal computer in storage and inquiry of article data - (대한 흉부외과학회지에 발표된 논문의 분석 고찰 - 개인용 콤퓨터를 이용한 논문자료의 저장과 조회의 실례 -)

  • Kim, Eung-Jung;Lee, Jeong-Ryeol;Na, Myeong-Hun
    • Journal of Chest Surgery
    • /
    • v.23 no.3
    • /
    • pp.423-429
    • /
    • 1990
  • Authors designed a computer-based article data management system using a 16 bit IBM personal computer and dBASE IV program and applied it to the management of article data of the Korean Journal of Thoracic and Cardiovascular Surgery. In this system, authors developed a coding system for systemic classification of form and subject of articles and this coding system made the storage and inquiry of data easy and convenient. Using the coding system in this article management system, total 1476 sheets of articles in the Korean Journal of Thoracic and Cardiovascular Surgery were analyzed and briefly described according to their forms and subjects. If this article data management system including the coding system is applied to other Journals related to the department of thoracic and cardiovascular surgery, we can utilize them easily and conveniently for the save of time and effort in the data inquiry or article preparation.

  • PDF

An Empirical Study on the Use of Intelligent Personal Secretary Service Based on Value-based Acceptance Model (가치 기반 수용모델에 기반한 지능형 개인비서 서비스 사용에 대한 실증 연구)

  • Kim, Sanghyun;Park, Hyunsun;Kim, Bora
    • Knowledge Management Research
    • /
    • v.19 no.4
    • /
    • pp.99-118
    • /
    • 2018
  • Recently, individuals are interested in a variety of products and services based on artificial intelligence. Among those products and services, an intelligent personal assistants are attracting many attention from IT companies as a next generation platform. Thus, the main purpose of this study is to investigate effects of intelligent personal assistant's benefits on user's value formation and adoption behavior based on Value-based Adoption Model. In addition, the moderating effect of personal innovativeness is examined through empirical analysis. Based on the analysis with the data from actual users, the results show that usefulness, enjoyment, technicality and cost advantage have significant influences on perceived value and correspondingly have an effect on intention to adopt. Personal innovativeness is related to the relationship between perceived value and intention to adopt. These findings may provide important insights to the relevant field regarding the use and spread of intelligent personal assistants.