• Title/Summary/Keyword: Personal Information

Search Result 5,918, Processing Time 0.036 seconds

Research on Framework and Inspection Method to Strengthen Personal Information Protection of Trustees (수탁사 개인정보보호 강화를 위한 프레임워크 및 점검방법 연구)

  • Yurim Bak;Yongtae Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.329-336
    • /
    • 2023
  • This paper analyzes the Personal Information Protection Act and related legal guides revised in 2023, proposes a framework for a consignment contract through the items necessary in the consignment relationship for personal information work, and inspects the status of personal information protection for consignees that are absent in Korea. By proposing common items that must be included, we prevent the occurrence of personal information leakage incidents by strengthening the basic personal information protection capabilities of trustees handling personal information work and alleviating the burden of essential personal information protection inspections. I want to do it.

A Study on the Factors Influencing College Students' Personal Information Management Behavior (대학생들의 개인정보관리 행태에 영향을 미치는 요인에 관한 연구)

  • Lee, Soo Yeon;Yi, Yong Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.1
    • /
    • pp.107-126
    • /
    • 2020
  • With the rapid increase in information and the development of information technologies, the importance of information management is increasing for individuals. The study aimed to examine how the motivations or disturbance factors of personal information management affect college students. First, the motivation and disturbance factors of personal information management were derived through the analysis of previous studies, and the effects of these factors on information organization and information management activities were analyzed. For this purpose, an online questionnaire was conducted for college students at a university in Seoul and a total of 593 valid responses were analyzed. The study found that the motivations or disturbance factors of personal information management influenced personal information management behavior. The study extends the literature of personal information management by analyzing the information management behavior of individuals and identifying the factors influencing such behavior. Furthermore, the finding of the study suggests the practical implications that it is essential to provide personal information management education so that college students can manage personal information efficiently.

Overview of Personal Information Protection Act in Korea (개인정보보호법의 개관 및 개정방향에 관한 연구)

  • Kim, Ilhwan;Sung, Jaeho
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.141-148
    • /
    • 2015
  • The Personal Information Protection Act enacted in March 2011 stated that the application target of this law includes all personal information processors in the public and private sector, and established the protection standard by phase such as collection, use and provision of personal information. There was an introduction of the Privacy Impact Assessment system that enables personal information processors to perform impact assessment autonomously if there are great concerns over the fact that making and expanding personal information files will influence the protection of personal information, while also making impact assessment compulsory for public institutions in specific reasons with great concerns for violating the rights of the subjects of information. This Act still has the problem that it is generally difficult to understand. This paper deals with the Korean legal practices about the personal information protection with regard to ambiguity and promotional system.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Web Document Analysis based Personal Information Hazard Classification System (웹 문서 분석 기반 개인정보 위험도 분류 시스템)

  • Lee, Hyoungseon;Lim, Jaedon;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.69-74
    • /
    • 2018
  • Recently, personal information leakage has caused phishing and spam. Previously developed systems focus on preventing personal information leakage. Therefore, there is a problem that the leakage of personal information can not be discriminated if there is already leaked personal information. In this paper, we propose a personal information hazard classification system based on web document analysis that calculates the hazard. The system collects web documents from the Twitter server and checks whether there are any user-entered search terms in the web documents. And we calculate the hazard classification weighting of the personal information leaked in the web documents and confirm the authority of the Twitter account that distributed the personal information. Based on this, the hazard can be derived and the user can be informed of the leakage of personal information of the web document.

Estimating Compensation for Personal Information Infringement in Korea Using Contingent Valuation Methods (CVM을 이용한 국내 개인정보 침해사고의 위자료 산정)

  • Kwon, Hong;Lee, Eun-Ju;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.367-377
    • /
    • 2012
  • (Estimating Compensation for Personal Information Infringement) As the value of personal information increases, personal information infringements is more likely to happen. The compensation for personal information infringements needs to be calculated in the process of infringement remedy. However, as personal information is regarded as non-market goods with no exchange price and calculating the remedy for mental sufferings from infringements has no guideline, it is not easy to determine the compensation amount. In this study, we adopt Contingent Valuation Methods (CVM) to analyze Willingness to Accept (WTA) of each type of personal information. Also, this study attempts to examine a standard model for calculating compensation by applying JNSA JO Model of Japan, which is not prepared in Korea. This study does not simply present a plan of estimating compensation. By measuring the value of personal information, it could awaken companies and organizations to the importance of personal information security.

An Analysis of Recognition on Personal Information Protection among Healthcare Administration Students in the Information Society (정보사회에서 보건행정 전공 대학생들의 개인정보보호에 대한 인지 분석)

  • Kim, Ji-On;Park, Ji-Kyeong
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.325-334
    • /
    • 2014
  • The purpose of this study was to examine the recognition of health administration students on personal information protection in an effort to be of use for raising awareness of personal information protection in students and for having them practice it in the right way. The subjects in this study were 687 college students who majored in health administration. A survey was conducted from December 3, 2012, to June 21, 2013. As a result, it's found that just 17.2 percent were cognizant of the personal information protection act. As for recognition and practice of personal information protection domain, the students who were aware of the personal information protection act significantly excelled the others who weren't in every area of recognition and practice, and there was a positive correlation between the level of practice, as better recognition led to better practice. The awareness rate of information for a personal identification stood at 57.0 percent, and the awareness rate of personal information to be managed stood at 53.7 percent, which were both at an intermediate level. To raise awareness of the personal information protection act in health administration students, a course that can deal with this act should separately be offered so that they could have the right understanding of personal information protection and practice it properly.

A Study on the Threat Review to use Secure Smartphone Applications (안전한 스마트폰 앱 사용을 위한 위협 요소 검토 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.41-54
    • /
    • 2020
  • In this paper, it will study various problems such as personal information infringement from when using various useful Apps in the Smartphone environment. It also researched the vulnerabilities Mobile Apps and the risks of personal information leakage when using Smartphone information to decrease threat and find solution. In the second chapter, it will check the existing Mobile App related Apps. In the third chapter, it will check the threats and major factors that caused by the leakage of personal information which related to the app. Then it will suggest solution and end with conclusion. This paper also looked at various problems that caused by illegal adverse effect from illegal personal information collection. Then it researched and made suggestion to make consideration on safety of personal information and privacy infringement that threat to personal information For safety of mobile banking, it proposed a safety method to separate and manage the code which has the core logic which required to run the App. For safety of direction App, when running the direction App, even if the information is collected, location information for unauthorized accessed will encrypt and store in DB, so that access to personal information is difficult. For delivery App environment, by using the national deliver order call center's representative phone to receive a telephone order then, the customer information is delivered to the branch office when it receive order and it will automatically delete information from the server when the delivery is completed by improving DB server of order. For the smart work app environment, the security solution operates automatically by separating and make independent private and work areas. Then it will suggest initialization for company's confidential business information and personal information to safe from danger even if loss.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.