• Title/Summary/Keyword: Personal Protection

Search Result 1,073, Processing Time 0.031 seconds

Indifference Problems of Personal Information Protection of Social Media Users due to Privacy Paradox (소셜미디어 사용자의 프라이버시 패러독스 현상으로 인한 개인정보 무관심 형태에 대한 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.213-225
    • /
    • 2019
  • Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.

A Philosophical Inquiry into Caring in Nursing - Based on Ricoeur's Narrative Ethics - (간호에서의 보살핌에 대한 철학적 탐구 -리쾨르(Ricoeur)의 이야기 윤리에 기초하여-)

  • Kong Byung-Hye
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.7
    • /
    • pp.1333-1342
    • /
    • 2005
  • Purpose: This paper was aimed to inquire into Ricoeur's self -hermeneutics and narrative ethics, and apply it to personal identity constituting caring and care ethics in the practice of nursing. Its purpose is to provide a philosophical foundation for caring in nursing. Method: According to Ricoeur's narrative identity, ontological caring was interpreted as personal identity constituting caring. His ethics were described as care ethics, which contributed to preserving and promoting the personal dignity of the client, as self in search for the good life in the nursing practice. Results: Narrative understanding of the client pointed to the ontological role of care in the constitution of personal identity. From an ethical aspect of the narrative, respect for personal identity and personal dignity of the client was crucial to an ethical caring attitude, promoting self-esteem in the nursing practice. Conclusion: This paper suggested that Ricoeur's ethics could provide a philosophical basis for understanding ontological and ethical caring in nursing. This contributed to protection of the client from the threat of personal identity, as well as respecting their personal dignity.

Trends in Personal Data Storage Technologies for the Data Economy (데이터 경제를 위한 개인 데이터 저장 기술 동향)

  • Jung, H.Y.;Lee, S.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.54-61
    • /
    • 2022
  • Data are an essential resource for artificial intelligence-based services. It is considered a vital resource in the 4th industrial revolution era based on artificial intelligence. However, it is well-known that only a few giant platforms that provide most of the current online services tend to monopolize personal data. Therefore, some governments have started enforcing personal data protection and mobility regulations to address this problem. Additionally, there are some notable activities from a technical perspective, and Web 3.0 is one of these. Web 3.0 focuses on distributed architecture to protect people's data sovereignty. An important technical challenge of Web 3.0 is how to facilitate the personal data storage technology to provide valuable data for new data-based services while providing data for producers' sovereignty. This study reviews some currently proposed personal data storage technologies. Furthermore, we discuss the domestic countermeasures from MyData perspective, which is a typical project for data-based businesses in Korea.

Application of Martial Arts Method for the Detail Protection (근접경호업무 수행을 위한 경호무도의 접근방법)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.161-191
    • /
    • 1999
  • Protection martial arts are neither the ability to protect oneself nor the exercise to increase the personal record. Their aim is to protect clients for the sake of their safety, Therefore, it needs special training course distinguished form general martial arts. Those who perform the duty of protection should make efforts to master every skill capable of meeting any situations in which unforeseen accidents may occur. So the coaches of protection martial arts should teach their disciples basic techniques by stages according to each martial art. They also should teach them systematically how to deal with each accidental affair on the ground of protection method. With teaching the way to cope with a crisis coaches might make the disciples feel real by presenting the real situation of different events to which protection arts can be applicable. And a mock exercise with a careful plan and enough practices as well as a mental training to all evaluate the anxiety which might be shown on duty could be helpful for educating elite personnel who will perform the duty of protection completely.

  • PDF

Mobile Payment Use in Light of Privacy Protection and Provider's Market Control

  • Mohammad Bakhsh;Hyein Jeong;Lingyu Zhao;One-Ki Daniel Lee
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.257-276
    • /
    • 2021
  • This study investigates the factors that facilitate or hinder people to use mobile payment, especially drawing upon the theoretical perspectives on individual's privacy protection motivation and perceived market condition. Survey data (n = 200) were collected through a web-based platform and used to test a theoretical model. The results show that one's privacy protection power is formed by various individual and technological factors (i.e., perceived data exposure, self-efficacy, and response efficacy), and in turn it determines his/her intention to use mobile payment. Moreover, the relationship between privacy protection power and mobile payment use is conditional on the perceived market control by the service provider - with a perception of the high level of provider's market control, one uses mobile payment regardless of his/her privacy protection power, while under the low level of provider's market control, the decision depends on the degree of privacy protection power. The findings would help our understanding of why some people are more susceptible to mobile payment and others are not.

The Meaning and Tasks of Guidelines for Utilization of Healthcare Data (보건의료 데이터 활용 가이드라인의 의미와 과제)

  • Shin, Tae-Seop
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.31-55
    • /
    • 2021
  • The Personal Information Protection Act, one of the revised 3 Data Laws, established a special cases concerning pseudonymous data. As a result, a personal information controller may process pseudonymized information without the consent of data subjects for statistical purposes, scientific research purposes, and archiving purposes in the public interest, etc. In addition, as a follow-up to the revised Personal Information Protection Act, a 'Guidelines for Utilization of Healthcare Data' was prepared, which deals with the pseudonymization in the medical sector. The guidelines are meaningful in that they provide practical criteria for accomplices by defining specific interpretations and examples that take into account the characteristics of healthcare data. However, the guidelines need to clarify the purpose of using pseudonymous data and strengthen the fairness of the composition of the data deliberation committee. The guidelines also require establishing a healthcare data compensation framework and strengthening the protection of rights for vulnerable subjects. In addition, the guidelines need to be adjusted for inconsistency with the Bioethics and Safety Act and the Medical Service Act. It is expected that this study will contribute to the creation of a safe environment for the utilization of healthcare data as well as the improvement of related laws and systems.

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

Collection of Location Data and Human Rights to Information projected onto the Apple Inc.'s Case (애플사(社)의 위치정보 수집과 정보인권)

  • LEE, Min-Yeong
    • Informatization Policy
    • /
    • v.19 no.1
    • /
    • pp.74-90
    • /
    • 2012
  • This thesis analyzes the Apple Inc.'s case from the viewpoint of the necessity for the protection of information privacy related to location data as for information society and ubiquitous community. Meanwhile, the regulatory conformity to equilibrium of contradictional value between personal data protection and utilization of information is debated from the fundamental right as for constitutional law concept to the commercial and technological structure in terms of economic and business point. Therefore, this paper reaches the conclusion that the legislative system should form a harmonious relationship between legal protection and lawful utilization to reappraise the present condition of legalization on personal data protection from guaranteeing rights and interests of information subject in the perspective of human rights to information guarantee consequently. As a result, it is required to revaluate the lawfulness of the fine on the violation of administrative duty levied by KCC(Korea Communications Commission).

  • PDF

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

A Study on the Disclosure and Exemption of the Personal Data (개인정보의 공개와 보호에 관한 연구 - 영국 사례를 중심으로 -)

  • Kim, Jung Ae
    • The Korean Journal of Archival Studies
    • /
    • no.29
    • /
    • pp.225-268
    • /
    • 2011
  • The general public are interested in the politics and form public opinion and keep in check the government for true democracy. The general public have the right to be furnished information from the government. And the government should enact the Freedom of Information Act to provide the public's right to know. At the same time, the government should enact the Data Protection Act to provide the public's right to privacy. There is a friction between the Freedom of Information Act and the Data Protection Act. It's hard to maintain the proper balance between the Freedom of information Act and the Data Protection Act, but many countries try to do so. The UK enacted the Data Protection Act 1998(DPA), which entered into force on 2000, to comply with EU Directive 1995. The Freedom of Information Act 2000(FOI), which came fully into force on 2005, was passed in 2000. The FOI imposes significant duties and responsibilities on public authorities to give access to the information they hold. The purpose of this study is to consider the provisions of the personal data in FOI and DPA. Besides this, it identifies the complaint cases on public authorities about the disclosure and exemption of the personal data in comparison with the acts. If information is the personal data of the person making the request, it will disclose under the DPA. If information is the personal data of a third party, it will disclose under the FOI. These acts interact each other to make up for the weak points in the other to make a proper application of the act on public authorities. This study may have any limitation in making a comparative study of the disclosure and exemption of the personal data in Korea. But it is expected to provide a basis for understanding the disclosure and exemption of the personal data in the UK.