• 제목/요약/키워드: Personal Data Protection

검색결과 466건 처리시간 0.032초

데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로 (The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry)

  • 김은찬;김은영;이효찬;유병준
    • 정보화정책
    • /
    • 제28권3호
    • /
    • pp.49-72
    • /
    • 2021
  • 본 연구는 2020년 8월에 시행된 데이터 3법 개정안의 주요 내용과 의미, 향후 전망 등을 금융 산업계 및 데이터 산업계에 미치는 영향을 중심으로 분석·고찰한다. 신용정보법의 개정으로 과거 신용 조회업으로만 단일 규정되었던 업종이 구체화 될 수 있을 것으로 보이고, 국내 데이터 산업계에는 마이데이터 산업 및 데이터 거래 산업과 플랫폼 활성화, 데이터 가명 처리와 거래 절차의 구체화 등이 가능하리라 전망된다. 데이터 3법 개정안의 합리적·효율적 적용과 이행을 위해서는 개인정보보호위원회의 운영이 최대한 투명하고 적법하며, 그 과정에서 공정성이 보장되어야 한다. 개인정보 활용에 있어서도 데이터 처리 기술의 개발·보완이 필수적이고, 명확한 데이터 처리 방법과 영역이 규정될 필요가 있다. 나아가 공정한 데이터 시장 경쟁 체제 보장 및 제도화, 데이터 위법 행위에 대한 처벌 규정 강화, 보안 시스템의 확립 및 강화, 데이터 이관에 대한 협력 시스템 강화가 뒷받침되어야 할 것이다.

스마트 그리드 사용자도메인의 개인정보보호방안 연구 (A Study of Personal Data Protection Method of Customer Domain on Smart Grid)

  • 최동민;심검;정일용
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2012년도 춘계학술발표대회논문집
    • /
    • pp.359-361
    • /
    • 2012
  • 스마트 그리드는 전력망에 정보기술을 접목하여, 전력공급자와 소비자가 양방향으로 정보를 실시간으로 교환하고 에너지효율을 최적화하여 새로운 부가가치를 창출할 수 있는 차세대 전력망이며 기존의 전력 시스템과는 달리 시스템의 개방성이 높아짐으로서 보안위협이 증가하였다. 이러한 보안 위협 중에서 본 연구는 전력망 소비자의 개인정보와 밀접한 관련을 갖는 사용자도메인에서 발생가능한 개인정보 침해 위협을 분석한다.

  • PDF

u-IT 환경에서의 개인화서비스를 위한 개인정보 보호방안 연구 (A Study on a Protection of Personal Data for Personalized Services in Ubiquitous Environment)

  • 김영삼;박주영;진승헌
    • 전자통신동향분석
    • /
    • 제25권2호
    • /
    • pp.132-141
    • /
    • 2010
  • 인터넷 이용이 활성화되면서 온라인서비스의 종류와 양은 계속 증가하고 있다. 최근에 서비스제공자들은 이러한 다양한 서비스들을 효율적으로 제공하기 위해 개인화서비스를 제공하기 시작하였고, 이에 따라 개인정보의 중요성은 더욱 증대되고 있다. 하지만 개인정보의 수집은 프라이버시 침해 문제를 유발할 수 있어 개인화서비스는 쉽게 적용되지 못하고 있다. 또한 다가오는 유비쿼터스 환경에서는 수집 가능한 개인정보의 증가가 예상되며, 따라서 프라이버시 침해 문제는 더욱 심각해질 것으로 예상된다. 본 고에서는 개인화서비스 모델에 대해 소개하고, 개인정보 보호를 위한 기존 기술들에 대해 분석하여, 유비쿼터스 환경에서의 개인화서비스를 위한 개인정보 보호방안에 대한 제언을 하고자 한다.

AES를 이용한 RFID 상호인증 프로토콜 (RFID Mutual Autentication Protocol Using AES)

  • 김석;한승조
    • 한국정보통신학회논문지
    • /
    • 제16권9호
    • /
    • pp.1963-1969
    • /
    • 2012
  • 유비쿼터스 시대를 맞이한 현재 RFID(Radio Frequency Identification)의 사용은 급속한 증가추세에 있으며, 생활전반에 걸쳐 사용되고 있다. 무선주파수를 이용하여 자동으로 데이터를 인식할 수 있는 RFID 시스템은 개인정보보호나 보안에 대해 취약하다. 또한 암호학적 안정성을 적용하기에 수동형 태그의 경우 하드웨어적으로 제한적인 문제를 가지고 있다. 본 논문에서는 임의비표(Nounce)라는 난수를 AES 암호화 알고리즘의 키로 사용하고 리더와 태그는 상호인증을 한다. 임의비표의 사용으로 보안적 취약점을 강화하고, 상호인증을 마친 후에만 서버에 접근하기 때문에 서비스 거부공격에 안전하다.

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

A Study on Policy Strategies for Settlement of North Korean Defectors in Korean Society

  • Cho, Woo-Hong
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권1호
    • /
    • pp.117-122
    • /
    • 2018
  • This study aims to search for policy strategies for settlement of North Korean defectors in Korean society, develop strategies based on the results and present their implications. For the purposes, this study set up a cause and effect model referring to previous bibliographical and statistical data. The results are presented as follows: First, to overcome anxiety of exposure in the defectors, personal information should be protected. Second, their psychological problems should be solved and they should be emotionally stable for better adaptation to Korean society. Third, keeping in mind that North Korean defectors are Korean people, the issue of nationality should be institutionally managed. Fourth, as one of difficulties they have is economic problems, practical support measures should be developed to solve them. Fifth, the federal government and local governments should be active in changing their recognition on them and provide the Korean community education for citizens to resolve cultural differences.

Privacy Analysis and Comparison of Pandemic Contact Tracing Apps

  • Piao, Yanji;Cui, Dongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4145-4162
    • /
    • 2021
  • During the period of epidemic prevention and control, contact tracing systems are developed in many countries, to stop or slow down the progression of COVID-19 contamination. However, the privacy issues involved in the use of contact tracing apps have also attracted people's attention. First, we divide contact tracing techniques into two types: Bluetooth Low Energy (BLE) based and Global Positioning System (GPS) based techniques. In order to clear understand the system structure and its elements, we create data flow diagram (DFD) of each types. Second, we analyze the possible privacy threats contained in various types of contact tracing apps by applying LINDDUN, which is a threat modeling technique for personal information protection. Third, we make a comparison and analysis of various contact tracing techniques from privacy point of view. These studies can facilitate improve tracing and security performance to contact tracing apps through comparisons between different types.

Examining China's Internet Policies through a Bibliometric Approach

  • Li, Jiang;Xu, Weiai Wayne;Wang, Fang;Chen, Si;Sun, Jianjun
    • Journal of Contemporary Eastern Asia
    • /
    • 제17권2호
    • /
    • pp.237-253
    • /
    • 2018
  • In order to understand China's internet governance, this paper examined 1,931 Internet policies of China by bibliometric techniques. Specifically, the bibliometric techniques include simple document counting, co-word analysis, collaboration network analysis and citation analysis. The findings include: (1) China's Internet legislations mainly emphasized e-commerce and Internet governance, and, to some extent, neglected personal data protection; (2) China's Internet is under intensive multiple regulatory controls by central government. A large number of government agencies are involved in Internet policy-making. The Propaganda Department of the Central Committee of the Communist Party of China and the State Information Leading Group of the State Council, enforced fewer policy documents, but occupy higher positions in the Internet governance hierarchy; (3) China's Internet legislation system is primarily composed of industry-specific administrative rules, rather than laws or administrative regulations. Nevertheless, laws and administrative regulations received significantly more citations owing to their superior force. This paper also discussed current gaps in China's internet governance and how the country's internet policies are situated in the broader global context.

Revising the Korean Newspaper Advertising Code of Ethics: An Empirical Investigation Leveraging Expert Interviews and Analytic Hierarchy Process (AHP) Surveys

  • Yoo, Seung-Chul;Kang, Seung-Mi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권3호
    • /
    • pp.135-148
    • /
    • 2023
  • The Code of Ethics for Newspaper Advertising in Korea, first implemented in 1976 and subsequently revised in 1976, 1996, and 2021, is a critical regulatory instrument for the country's advertising sector. However, the specialized domain of "advertising ethics," particularly the "code of advertising ethics," remains under-explored. This research addresses this scholarly gap, providing an empirical analysis of the 2021 amendment's revision trajectory. This study employs a robust methodological approach, integrating expert interviews and small-group AHP-based surveys. This approach allows for a comprehensive understanding of the revision needs, referencing existing ethical codes studies, and comparing similar ethics codes nationally and internationally. The research further investigates key challenges such as personal data protection and copyright issues in the rapidly evolving digital media landscape, while preserving the existing code's inherent value. The findings are expected to significantly contribute to the emerging field of advertising ethics in Korea, offering practical implications for future code revisions.

Healthcare Data Supervision and Secrecy in Cloud Computing

  • 알 아민 후세인;모하메드 마타하리 이슬람;모하메드 아잠;이승진;허의남
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2013년도 춘계학술발표대회
    • /
    • pp.695-697
    • /
    • 2013
  • Medical data sharing is increasing due to treatment duplication which increases the cost of medication. Medical healthcare system has been improved to combine with cloud computing. It reduces treatment delay and the medical data error. However, the concern about the privacy protection of medical information is also significant. Medical information is more sensitive than other information because involuntary disclosure can affect in both personal and social life. Privacy cloud brokerage has conquered great attention for solving these problems. Our method provides a security model in the cloud computing environment that facilitates the exchange of medical records between assigned custodians. It allows doctors to obtain a complete patient medical records which can help to avoid duplication, reduce the medical error and healthcare cost as well. In addition, our method offers a trustworthy solution against the privacy violence.