• Title/Summary/Keyword: Personal Information Infringement

Search Result 119, Processing Time 0.028 seconds

The Perception Survey for Personal Health Information Protection of First Aid Training Courses Students - Focused of EMT students and Nursing students - (응급처치 교육과정을 배우는 학생들의 개인의료정보 보호에 대한 인식도 조사 - 응급구조과와 간호과 학생을 중심으로 -)

  • Bae, Sung-Ju;Choi, Young-Jin
    • Journal of Korean Clinical Health Science
    • /
    • v.2 no.1
    • /
    • pp.25-34
    • /
    • 2014
  • Purpose. The checked of perception for the protection of personal medical information of EMT student and Nursing student. Methods. Nursing students and EMT students 200 questionnaires were collected and Frequency analysis, Chi-square test, one-way ANOVA was performed for using the Windows SPSS(ver. 12.0). Results. Most of the subjects were aware of the protection law of personal information and Infringement of the privacy of personal information will be exposed. also, Education is needed privacy(EMT students $3.84{\pm}0.96$, Nursing students $3.73{\pm}0.99$). EMT($3.99{\pm}1.00$) and Nursing($4.07{\pm}0.94$)students due to exposure to both the patient's personal information privacy was violated would get recognized. Exposure to the computerization of information privacy will be exploited in other agencies(EMT students $3.78{\pm}0.88$, Nursing students $3.95{\pm}0.94$) was called. Conclusions. For the protection of personal health information, education needs to be expanded.

Determinants of Willingness To Pay for Personal Information Protection (개인정보 보호를 위한 지불의사비용 결정요인)

  • You, Seung Dong;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.695-703
    • /
    • 2014
  • This paper studies the determinants of willingness to pay (WTP) for preventing personal information infringement. Most of previous studies only estimate the value of the WTP and, unlike them, this paper discusses personal information as an information good. Using a double-bounded dichotomous choice model, this paper empirically analyses the personal characteristics that determine the WTP for the protection of personal information. It contributes to the literature by proposing that gender, working status and communication cost are determinants for the WTP for the protection of personal information.

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.461-476
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment

  • Lee, Donghyeok;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.263-270
    • /
    • 2017
  • Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users' life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Analysis of the recognition level of personal information protection of public institutions in the local governments (지방자치단체 공공기관의 개인정보보호에 관한 인식 수준 분석)

  • Jang, Ji-Hye;Mok, Hwa-Jung;Kim, Yeon-Seo;Choi, Jin-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.345-350
    • /
    • 2016
  • It is the personal information protection law is prepared, in the government, to develop a personal information protection basic plan has been implemented. However, year after year, complaints caused by infringement of personal information in public institutions has increased. In this paper, the recognition level of analysis related to the protection of personal information of local governments, public institutions through a questionnaire survey, raised the need for improvement.

Future Tasks of the Law Forcing CCTV Installation in Operating Rooms (수술실 내 CCTV 설치 의무화 법안의 향후 과제)

  • Lim, Ji Yeun;Kim, Kye Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.185-210
    • /
    • 2021
  • On September 24, 2021, the new provisions(Article 38-2 of the Medical Service Act) mandatory CCTV installation in operating rooms where the unconscious patient is operating such as general anesthesia. The revised medical law aims to effectively prevent illegal activities that may occur in the operating rooms and to promote appropriate resolution to medical dispute. According to the law, medical institutions operating unconscious patients, such as general anesthesia, must install CCTVs in the operating rooms by September 25, 2023, and film surgical scenes only at the request of patients and their guardians, regardless of the consent of the medical personnel. The bill delegated the legislative device to minimize infringement of fundamental rights to subordinate statutes without stipulating it in the law.(Article 38-2(10)) The most realistic policy plan to minimize the infringement of the fundamental rights of patients is to prepare specific regulations. Therefore, this study examines the legislative background and main contents of the amended CCTV installation bill, and suggests issues to be reviewed when preparing subordinate statutes by analyzing major issues. It was reviewed based on compliance with the principle of minimizing infringement of fundamental rights of information subjects in the operating rooms. The information subjects of CCTV are health professionals and patients. Suggesting issues should be considered when preparing subordinate statutes so that the purpose of the CCTV installation law can be achieved while minimizing infringement of right of self-determination of personal information, personality rights, and human rights. It is hoped that this paper will be referred when discussing subordinate statutes and regulations to contribute minimizing infringement of fundamental rights.

Redundancy assessment of PIMS and PIPL by parsing (구문분석을 통한 PIMS와 PIPL의 중복성 평가)

  • Kim, So-Ra;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.745-756
    • /
    • 2016
  • As infringement accidents of personal information have often occurred and estimates of damages are too large, the government introduces many certifications related with personal information management system for protecting personal information. Among them, PIMS and PIPL share many points in common, so many complaints about duplicate regulation have been suggested. This study evaluates the duplication of two certifications in order to examine redundancy between PIMS and PIPL both of which have been controversial.

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

A Study of Priority for Policy Implement of Personal Information Security in Public Sector: Focused on Personal Information Security Index (공공분야 개인정보보호 정책 집행과제의 우선순위 분석: 개인정보보호 수준진단 지표의 선정 및 중요도를 중심으로)

  • Shin, Young-Jin;Jeong, Hyeong-Chul;Kang, Won-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.379-390
    • /
    • 2012
  • This study is to consider political implication of indicators to measure personal information security in public sector studied by Ministry of Public Adminstration and Security from 2008 to 2011. The study analyzed the priority of personal information security policy dividing into personal information security infrastructure, personal information management with life cycle, correspondence of information infringement by scholars, experts, and chargers. As the results, to progress personal information security policy is important to management of personal identification information on web site; specially institutional infrastructure as responsible organization, exclusive manpower, and security budget; personal information security infrastructure. As like the results, it would be reflected in the progress of personal information security policy and tried to provide systematic management program with improving safe information distribution and usefulness.