• Title/Summary/Keyword: Personal information collection

Search Result 231, Processing Time 0.045 seconds

A model for preventing the spread of infectious diseases using beacons (비콘을 활용한 감염병 확산 방지 시스템에 관한 모델)

  • Kim, Ho-Yoon;Kim, Hyo-Jong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.8
    • /
    • pp.14-22
    • /
    • 2021
  • As the Covid-19 outbreak spreads and prolongs around the world, visitor lists are prepared in various ways when entering the facility to prevent infection and identify confirmed people. In this study, we propose an access management system using beacons to solve the problems with the preparation and management of existing visitor lists. The research method searches the laws related to the collection of personal information and compares the current status of personal information collection and trends in the beacons. The proposed system compares and analyzes existing methods and security and efficiency, which confirm accurate and rapid access registration. By using Beacon access management system, it is effective in preventing and responding to the spread of new infectious diseases in the future.

A Study on the Protection for Personal Information in Private Security Provider's (경비업자의 개인정보보호에 관한 연구)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.99-108
    • /
    • 2011
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection / use of privacy data, processing of sensitive information / personal ID information, and encryption of privacy information); restrictions on installation / operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study. Possible solutions proposed by this study can be summed up as follows: By changing minds with sufficient legal reviews, it is required for security service providers to 1) clearly and further specify any purposes of collecting and using privacy information, if possible, 2) obtain any privacy information by legitimate means as it is necessary to collect such information, 3) stop providing any personal information for the 3rd parties or for any other purposes except fundamental purposes of using privacy information, and 4) have full knowledge about duty of safety measure in accordance with safe maintenance of privacy information and protect any personal information from unwanted or intentional leakage to others.

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

Automatic Event Clustering Method for Personal Photo Collection on Mobile Phone (휴대폰 상에서 개인용 사진 컬렉션에 대한 자동 이벤트 군집화 방법)

  • Yu, Jeong-Soo;Nang, Jong-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1269-1273
    • /
    • 2010
  • Typically users prefer to manage and access personal photo collections taken from a cell phone based on events. In this paper we propose an event clustering algorithm that requires low computation cost with high accuracy supporting incremental operation. The proposed method is based on the statistical analysis of the elapsed interval of intra-event photos on the real sample data for the decision of an event boundary. We then incorporate both location and visual information for the ambiguous range to split with only temporal cue. According to test results, we show higher performance compared to existing general clustering approaches.

A Study on Smart Trash Can and User UX Designs: A Software Engineering Approach for Health Care

  • Yoon, Jun-Ho;Bae, Geun-Pyo;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.725-727
    • /
    • 2017
  • In this study, a function that informs the trash can users about daily collectable trash types and the visiting schedule of collection trucks with an application-based push alarms is proposed along with other function that lets the user to receive the information regarding the volume of trash cans located near his/her residence and monthly average trash volume once the user registers his/her personal information online. This functions are used for the UX design between smart trash can and users. The proposed system allows trash collection trucks to find the most efficient path from their current positions by finding out users' trash can volumes in advance. The UX design and the smart trash can system proposed in this study aim to improve the trash processing efficiency by allowing users to check the volume of their trash.

Research on the Development of SLA Indicators for Personal Information Protection of Public IT Maintenance Business (공공정보화분야 유지관리사업의 개인정보보호를 위한 SLA 지표 개발에 대한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.37-42
    • /
    • 2020
  • In the field of public informatization maintenance business, the attacks of external illegal users such as unauthorized leakage, destruction, and alteration due to intentional or inadequate management of personal information are increasing. In order to prevent such security incidents in advance, it is necessary to develop and quantitatively manage SLA indicators. This study presents the privacy SLA indicators and suggests specific methods such as information collection method and timing of the privacy SLA indicators. In order to confirm the validity and reliability of the proposed SLA indicators, an online survey was conducted with a group of experts. As a result, it was evaluated that compliance rate of personal information destruction and compliance rate of personal information protection system would be effective when applied to new and revised SLA indicators in terms of importance and validity. In the future, using SLA indicators for personal information protection as a standard for public information maintenance will contribute to improving SW quality and securing safety.

Voice sensor based PSP timelog collection

  • Ibrahim, Ahmad;Choi, Ho-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06b
    • /
    • pp.87-90
    • /
    • 2008
  • The purpose of the research is to solve the problem of automating time & schedule management by the user in office or development environment. Maintaining timelog manually is difficult task for the users that are following the Personal Software Process (PSP). In this paper we have discussed the difficulties in automating this task and proposed a solution for this problem.

  • PDF

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

Study on Factors Affecting Effects of Online Behavioral Advertising (온라인 맞춤형 광고 효과에 미치는 요인들 연구)

  • Um, Namhyun;Kim, Sojung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.376-388
    • /
    • 2019
  • One important online marketing practice to emerge in recent years is online behavioral advertising. Online behavioral advertising entails a range of issues, including the following: personal information collection and usage agreements (three conditions: no agreement, agreement, or agreement with a reward), consumers' levels of perceived personalization (low vs. high), and consumers' level of online privacy concerns (low vs. high). The effects of all these is what this study is designed to examine, as it evaluates online behavioral advertising. Study findings suggest that types of information collection and usage agreement play a pivotal role in the evaluation of online behavioral ads. Individuals who provided the informed consent form with the possible reward had a more favorable attitude toward the brand than individuals who provided the informed consent form without a possible reward. In terms of personalization, the level of perceived personalization of the advertising message impacted consumers' attitudes toward the online behavioral ad and toward the brand. Finally, online privacy concerns appear to impact consumers' attitudes toward the online behavioral ad and toward the brand. Theoretical and practical implications are also discussed.

A Study on Acquisition Strategy of Records for Artists and Their Records Information Management (시각예술 작가 기록물 수집전략 및 기록정보 관리 연구)

  • Jung, Kong Ju;Park, Ju Seok
    • The Korean Journal of Archival Studies
    • /
    • no.40
    • /
    • pp.61-93
    • /
    • 2014
  • One of the reasons behind the surfacing of such issues is because the record does not exist and even if the records remained, it is because they are not being properly managed. In Korea, National institutions in the field of visual arts, currently there are no archives that manage only the records for the visual arts as an independent institution, and the reality is that the National Museum of Archives is still in the beginning stage as well. This study has conducted a research on the records collection strategy and the management of the record information of an author who is the creator of the visual arts as a starting point of the visual arts. For this purpose, the definition of visual arts and the concept of an author covered in this study will be examined and the types of documentary that may occur in the field of visual arts were analyzed. In addition, the history of an author is its personal record thus a personal history and private archive have been examined. Based on this background, the cases on the personal record and the management of the record information of domestic and foreign authors were analyzed and the implications were derived.