• Title/Summary/Keyword: Personal Policy

Search Result 1,243, Processing Time 0.028 seconds

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

The Effects of Student's Stress and Personal Relationship on Smart Phone Addiction

  • Kang, Gil-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.147-153
    • /
    • 2015
  • This Study is to test the causal relationships among university student's stress, personal relationships and psychological anxiety, and then suggest some theoretical and policy implications basing on the analytical results. For the purpose of this study, survey targeting on 416 university students was conducted. The analytical results of this study showed that psychological anxiety moderates the relation between the stress, personal relationship and smart phone addiction. This study suggested some implications basing on this analytical results.

Community Involvement and Health Policy - New Approach to Health Education and Behavioral Science - (주민참여와 보건정책 - 보건교육 및 행태론의 새로운 접근 -)

  • 김대희
    • Korean Journal of Health Education and Promotion
    • /
    • v.8 no.1
    • /
    • pp.34-44
    • /
    • 1991
  • Since it was found out that the degree of medical contribution to health was timid. the direction of health policy studies has been focused on the personal health behavior. Participation in health has been closely related to the behavior. Those who have insisted on the new direction believe that the health policy laying stress on low cost and personal responsibility can avoid the pathology of medical policy and medical crisis. Participation in health has been very important method of changing health behaviors. It is certainly important to change bad health behaviors. But there is no deliberation of social structure here. Most health behaviors are the adaptation to social structure. The attempt to change the established adaptation behaviors without considering social structure is difficult to succeed. It is little meaningful to say the importance of the health behavior to those who have no choice but to be ill due to the poor environment and health risks. What can guarantee the real direction of community participation at least is the consciousness and behaviors of people's right.

  • PDF

GDPR Compliant Consent Procedure for Personal Information Collection in the IoT Environment (IoT 환경에서 GDPR에 부합하는 개인정보수집 동의 절차)

  • Lee, Goo Yeon;Bang, Junil;Cha, Kyung Jin;Kim, Hwa Jong
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.129-136
    • /
    • 2019
  • Many IoT devices like sensors lack screen and input devices, thus making them hard to meet the consent conditions that GDPR requires. This is acting as a legal barrier for further advancement in the business field. In this paper, we designed the process for consent of personal information collection that meets the legal conditions. In this design, user's personal data is received in an encrypted form by data collecting server first. The encrypted personal data can be decrypted after associating with user agent based on the consent procedure of the collection of personal information. During the consent procedure, user agent understands the privacy policy about personal information collection and offers the key to decrypt the data. This kind of personal information collection agreement procedure will satisfy the transparent and freely given consent requirements of GDPR. Thus, we can speculate from here that the proposed procedure will contribute to the evolution of IoT business area dealing with personal information.

Privacy Policy Analysis Techniques Using Deep Learning (딥러닝을 활용한 개인정보 처리방침 분석 기법 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.305-312
    • /
    • 2020
  • The Privacy Act stipulates that the privacy policy document, which is a privacy statement, should be disclosed in order to guarantee the rights of the information subjects, and the Fair Trade Commission considers the privacy policy as a condition and conducts an unfair review of the terms and conditions under the Terms and Conditions Control Act. However, the information subjects tend not to read personal information because it is complicated and difficult to understand. Simple and legible information processing policies will increase the probability of participating in online transactions, contributing to the increase in corporate sales and resolving the problem of information asymmetry between operators and information entities. In this study, complex personal information processing policies are analyzed using deep learning, and models are presented for acquiring simplified personal information processing policies that are highly readable by the information subjects. To present the model, the personal information processing policies of 258 domestic companies were established as data sets and analyzed using deep learning technology.

The Dynamics of British Welfare Pluralism from Post World War II until the New Labour Government: Personal Social Service Policy for the Elderly (제2차 세계대전 이후부터 신 노동당 정부까지 영국의복지 다원주의의 역동성: 노인을 위한 개인적 사회 서비스 정책을 중심으로)

  • Park, Seung-Min
    • 한국노년학
    • /
    • v.39 no.3
    • /
    • pp.429-449
    • /
    • 2019
  • The purpose of this research is both to analyse the dynamics of welfare pluralism in the personal social service policy for elderly British people and to provide policy implications based on analysis of the post World War II time era up until the end of the New Labour Government. Content analysis of government and parliament reports, minutes, scripts for party conferences, legislations, declassified government documents, and institutes' reports of the Conservative, Labour, and New Labour Governments from 1945 to 2010 shows that the governments played only assistive roles in welfare pluralism at any given point in time. The negative experiences of elderly British can be attributed to the unbalanced structure of roles held by public and private institutions for personal social services. They ultimately have important policy implications for the foundation of welfare pluralism in elderly Korean community care by the Moon Jae-in government.

Implementation of Privacy Protection Policy Language and Module For Social Network Services (소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현)

  • Kim, Ji-Hye;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • An SNS(Social Network Service) enables people to form a social network on online as in the real world. With the rising popularity of the service, side effects of SNSs were issued. Therefore we propose and implement a policy-based privacy protection module and access control policy language for ensuring the right of control of personal information and sharing data among SNSs. The policy language for protecting privacy is based on an attribute-based access control model which grants an access to personal information based on a user's attributes. The policy language and the privacy protection module proposed to give the right of control of personal information to the owner, they can be adopted to other application domains in which privacy protection is needed as well as secure sharing data among SNSs.

A Study on Removal Request of Exposed Personal Information (노출된 개인정보의 삭제 요청에 관한 연구)

  • Jung, Bo-Reum;Jang, Byeong-Wook;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.37-42
    • /
    • 2015
  • Although online search engine service provide a convenient means to search for information on the World Wide Web, it also poses a risk of disclosing privacy. Regardless of such risk, most of users are neither aware of their personal information being exposed on search results nor how to redress the issue by requesting removal of information. According to the 2015 parliamentary inspection of government offices, many government agencies were criticized for mishandling of personal information and its leakage on online search engine such as Google. Considering the fact that the personal information leakage via online search engine has drawn the attention at the government level, the online search engine and privacy issue needs to be rectified. This paper, by examining current online search engines, studies the degree of personal information exposure on online search results and its underlying issues. Lastly, based on research result, the paper provides a sound policy and direction to the removal of exposed personal information with respect to search engine service provider and user respectively.