• Title/Summary/Keyword: Personal data

Search Result 5,526, Processing Time 0.028 seconds

A Study on the Conflict between the Use of Personally non-Identifiable Information and the Protection of Personal Information in Digital Behavioral Advertising: Focusing on the Domestic and Foreign Status and System (디지털 맞춤형 광고에서 비식별개인정보의 활용과 개인정보 보호와의 갈등에 관한 연구: 국내외 현황과 제도를 중심으로)

  • Choi, Min-Wook
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.71-79
    • /
    • 2021
  • This study looked at the conflict between the aspect of the use of personally non-identifiable information for the development of the big data industry and the digital advertising industry and the aspect of personal information protection. In order to achieve the research purpose, this study focused on literature research such as thesis, legal texts, administrative regulations, and recent media articles. As a result of this study, the main issues related to the protection of personally non-Identifiable Information in digital behavioral advertising were 'conflict between freedom of advertising expression and personal rights', 'personalization of unidentifiable information', 'information imbalance'. In this regard, as measures to protect personally non-identifiable information in digital behavioral advertising, it was proposed to 'harmonize with freedom of advertising expression and personal rights, 'improve notification and consent. process', and 'reinforce the right to control personal information'.

Research on the Domestic and Foreign Legislation about Secondary Use Protection for Personal Health Information (개인건강정보의 2차이용 보호에 관한 국내외 법안 연구)

  • Park, Han-Na;Jung, Boo-Geum;Lee, Dong-Hoon;Chung, Kyo-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.251-260
    • /
    • 2010
  • Through the convergence of medical services and the IT technique, the patient's personal health information computerization has been rapidly spread with propagation of electronic medical record(EHR). In addition, by entering u-health, the demand of the secondary use for public health, medical research, and medical service using electronic patient health care records are increasing. The personal health information secondary uses for the development of academic medical area and service, are very good thing. But, carelessly to use personal health information, the patient privacy would be damaged. However, there are not yet systematic studies about secondary use of personal health information. Therefore, in this paper, we analyze the difference of the internal and external bill for personal medical data secondary use and propose the direction of the medical service development and preservation of the individual's privacy.

Development of Personal Location Identification Device based on Energy Harvesting (에너지 하베스팅 기반 개인 위치식별 장치 개발에 관한 연구)

  • Ha, Yeon-Chul;Son, Seo-Woo;Park, Jae-Mun;Lee, In-Seong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.3
    • /
    • pp.134-140
    • /
    • 2021
  • This study relates to the development of a wearable device that can identify a personal location using low-power GPS and IMU based on energy harvesting. The energy harvesting technology using a piezoelectric device was applied for the development of personal location identification, and made it possible to acquire precise personal location data using GPS and IMU. As a result of the experiment, it was confirmed that GPS and IMU data were normally received. The personal location identification device can be prepared for an accident by identifying a personal location in a disaster area, etc., and the user will be able to use it easily regardless of time, place, and environment. It is expected that it can be used in various fields such as leisure and health care.

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

A Study on Personal Information Protection Management Assessment Method by DEA (DEA 모형을 이용한 개인정보보호 관리수준 평가방법에 대한 연구)

  • Jeong, Myeong-soo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.691-701
    • /
    • 2015
  • Recently, with the growing number of services using personal information, government offices' tasks have become more dependent to personal information. Various policies and systems have been made and managed for the safe use of personal information in the circumstances that inevitably require the use of personal information, but the personal information privacy incidents and their scale are on a constant increase. Thus, Korea has been implementing personal information protection management system since 2008 to examine whether public organizations observe the personal information protection act and to how well they manage the personal information, and to improve what is insufficient in the process. However, despite high scores of the outcomes of the system, questions about the effectiveness of the outcomes and about the actual manage level are being raised. Thus, this study seeks to analyze public organizations' activities to protect personal information and the effectiveness of their foundation efforts for them by using the DEA model, and to propose a new model to enhance the effectiveness of the outcomes of personal information protection management system by reflecting them into the outcomes of system, using the derived effectiveness.

Development of Automatic Data Transmitting System of Arterial Blood Gas Results via Local Area Network( LAN) (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.327-332
    • /
    • 1993
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system that transmits data from the arterial blood gas analyzer to the request site automatically In this system HOST computer, FILE server,'LAN(Local Area Network) , 3270 Emulator and bfulti-port card are integrated with 3 blood gas analyzers(NOVA Inc., USA) which are connected to a single multi-port card in a personal computer. When specimen are collected from tramp)inly sites, they are transferee to the laboratory In the Yonsei Cardiovascular Center After analysis, the result is transmitted to the personal computer via serial commnunication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Patient ID No., etc.) is obtained from the HOST computer througth the emulator. The combined data (patient information & lab data) is transmitted to each request site via LAN automatically These results are stored in the File Server for one year and they can be reviewed anytime. Also, it could be used for the various statistics and the flow chart for clinical research. Additionally, we found thal this system reduces the personal labor.

  • PDF

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

Accident detection algorithm using features associated with risk factors and acceleration data from stunt performers

  • Jeong, Mingi;Lee, Sangyeoun;Lee, Kang Bok
    • ETRI Journal
    • /
    • v.44 no.4
    • /
    • pp.654-671
    • /
    • 2022
  • Accidental falls frequently occur during activities of daily living. Although many studies have proposed various accident detection methods, no high-performance accident detection system is available. In this study, we propose a method for integrating data and accident detection algorithms presented in existing studies, collect new data (from two stunt performers and 15 people over age 60) using a developed wearable device, demonstrate new features and related accident detection algorithms, and analyze the performance of the proposed method against existing methods. Comparative analysis results show that the newly defined features extracted reflect more important risk factors than those used in existing studies. Further, although the traditional algorithms applied to integrated data achieved an accuracy (AC) of 79.5% and a false positive rate (FPR) of 19.4%, the proposed accident detection algorithms achieved 97.8% AC and 2.9% FPR. The high AC and low FPR for accidental falls indicate that the proposed method exhibits a considerable advancement toward developing a commercial accident detection system.