• Title/Summary/Keyword: Personal information protection management

Search Result 269, Processing Time 0.021 seconds

Protecting Children's Online Privacy : Privacy Issues and Its Implications (아동 이용자에게 특화된 온라인 개인정보보호 이슈 : 사례연구를 중심으로)

  • Rha, Jong-Youn;Cho, EunSun;Lee, SeungEun
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.23-31
    • /
    • 2020
  • As children's participation in online activities has recently increased, online services for children are also rapidly increasing, but children are not sufficiently guaranteed their rights. The purpose of this study is to classify and analyze issues related to the children's online privacy issues in Korea through the current status and case studies of application services mainly used by children. For this purpose, this research analyzed problems related to the children's online privacy protection according to the stage of using the application. As a result of the application content analysis, 1) issues of child identification, 2) effectiveness of notice and consent, and 3) issues of children's rights as subjects of information were derived. Based on the current status analysis, the policy implications were drawn based on the children's online privacy protection in the online environment, and suggestions were made for improvement.

Mobile App Privacy Checklist for Consumer (모바일 앱 프라이버시 보호를 위한 소비자 체크리스트)

  • Li, Hua-Yu;Kim, Lin-Ah;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.1-12
    • /
    • 2015
  • In recent years, the privacy concern for mobile consumers is emerging as the use of mobile application(apps) is growing according to the rapid spread of mobile devices such as smart phones and tablet PCs. To improve privacy protections in the mobile communications and apps, overseas organizations are announcing guidelines and/or checklists for stake holders. Although personal information protection guidelines for application developers have been prepared in the country, efforts to improve consumer privacy capability is insufficient. Thus, in this paper we first scope the app privacy related guidelines in both domestic and foreign affairs, then present the risk factors of privacy invasion by the stage of mobile application use based on the "Privacy Protection Act", offering privacy checklists for consumers. This checklist will enhance the self-management capability of consumer privacy and create virtuous cycle in the mobile ecosystem.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

The Effect of Individual Risk Appraisal and Ability to Control on Information Privacy Concerns in Online Social Network (온라인 소셜네트워크에서 개인의 위험성평가와 자기통제력이 정보보안우려감에 미치는 영향)

  • Moon, Yun Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.294-301
    • /
    • 2017
  • Recently, online social networks have become one of the most representative Internet services and are being used increasingly, which allows people to share information and interact with other people. On the other hand, as the use of OSN is increased, there has been an increased incidence where illegally accessed personal information is used wrongfully. Accordingly, privacy has become a key concern by the users. Regarding the construct of information privacy concerns (IPC), this study explored the antecedents of IPC at the individual personal level - risk appraisal and perceived behavioral control - based on Protection Motivation Theory. Hence, the current paper investigated the moderating effect of gender in the relationship between individual characteristics and IPC. The hypothesized research model was examined with 233 questionnaires of OSN users. The results showed that the positive effects of risk appraisal and the negative effects of perceived behavioral control on IPC are supported. In addition, the moderate effects of gender between risk appraisal and IPC is only supported.

Physiotherapy Management for COVID-19 (코비드-19와 물리치료적 접근)

  • Han, Yun-A;Roh, Hyo-Lyun
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.15 no.3
    • /
    • pp.135-147
    • /
    • 2020
  • PURPOSE: The purpose of this paper is to provide a review of physiotherapy intervention for patients with COVID-19 during their hospital admission and post-discharge. METHODS: The recommendations and guidelines of physiotherapy management, medical management, and general information of the WHO, Australian Physiotherapist, European Respiratory Society, British Thoracic Society, and American Thoracic Society were reviewed. RESULTS: This paper contains general information on COVID-19, including medical management, and the importance of physiotherapy approaches including an assessment of the patients' function, such as the 6-minute walking test, five sit to stand or sit to stand for one minute to measure their function as their recovery journey. The patients' quality of life, anxiety, and depression should be considered. Physiotherapy management should be based on an assessment of the patient's presenting impairments, including inclusion and exclusion of physiotherapy intervention. The paper also approaches step by step with the disease progress, from an intensive care unit, the general ward in the acute phase, through to the rehabilitation ward if needed, and post-discharge as an outpatient.. CONCLUSION: The paper has a limitation due to the unknown factor of the natural history of COVID-19. Depending on the patients' recovery journey and the rehabilitation needed, any physiotherapy interventions should focus on what the patients' need on their journey to recovery, e.g., pulmonary, cardiac, neurological, and general rehabilitation. In addition, applying personal protection equipment for treating physiotherapists is a mandatory requirement because this protects from the transmission of COVID-19.

A Study on the Factors Affecting the User Resistance in Social Network Service (Social Network Service에서의 사용자 저항에 영향을 미치는 요인에 관한 연구)

  • Park, Eunkyung;Choi, Jeongil;Yeon, Jiyoung
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.3
    • /
    • pp.387-406
    • /
    • 2014
  • Purpose: The widespread use of social network services (SNS) has caused users concern about the disclosure of their privacy or personal information. The purpose of this study is to analyze the factors of privacy concern and self presentation that affect the user resistance in the use of social network service. Methods: This study verifies the factors that affecting the user resistance in SNS. The research model suggested in this study is tested via a survey of 260 SNS users. SPSS and Smart PLS had been used to test the suggested hypotheses. Results: This study shows that privacy experience, privacy awareness, self esteem, and social desirability significantly influence perceived risk and that privacy awareness, self esteem, self efficacy, and perceived risk significantly influence perceived trust. It also verifies that perceived risk and perceived trust positively affect user resistance. Conclusion: This paper suggests that high awareness on privacy of SNS user encourages the SNS companies to consider the privacy protection mechanism for eliminating various factors that affecting the risk. This study also shows that the privacy calculus model applies to understanding the mechanism on resistance of SNS user.

A Case Study on the Protection of Accounts and Assets on Cryptocurrency Exchanges: Focusing on the Processes of Related Institutions (가상통화거래소의 계정 및 자산 보호에 관한 사례연구: 유관기관의 프로세스를 중심으로)

  • Yoonjoo Lee;Dongwon Lee;Ingoo Han
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.135-161
    • /
    • 2020
  • With the growth of blockchain and cryptocurrency-related markets, cryptocurrency exchanges are growing as a new industry. However, as the legal and regulatory definitions of cryptocurrencies are still in progress, unlike existing industrial groups, they are not under the supervision of regulatory agencies. As a result, users (i.e., cryptocurrency investors) have suffered two types of damage that could occur from hacking and other accidents on the exchanges. One type of the damage is the loss of assets caused by the extortion of personal information or account and the other is the damage from users who might be involved in external frauds. Both are analyzed in comparison with existing operators whose functions are like the exchanges. The results of this study show that membership (KYC: Know Your Client), log-in, and additional authentication in transactions are on the similar level to those of the operators while the fraud detection system (FDS) and anti-money laundering (AML) of fiat currencies and cryptocurrencies need rapid improvement.

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.

FAIR-Based BIA for Ransomware Attacks in Financial Industry (금융 산업에서 발생하는 랜섬웨어 공격에 대한 FAIR 기반의 손실 측정 모델 분석)

  • Yoon, Hyun-sik;Song, Kyung-hwan;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.873-883
    • /
    • 2017
  • As Ransomware spreads, the target of the attack shifted from a single personal to organizations which lead attackers to be more intelligent and systematic. Thus, Ransomware's threats to domestic infrastructure, including the financial industry, have grown to a level that cannot be ignored. As a measure against these security issues, organizations use ISMS, which is an information protection management system. However, it is difficult for management to make decisions on the loss done by the security issues since amount of the damage done can not be calculated with just ISMS. In this paper, through FAIR-based loss measurement model based on scenario's to identify the extent of damage and calculate the reasonable damages which has been considered to be the problem of the ISMS, we identified losses and risks of Ransomeware on the financial industry and method to reduce the loss by applying the current ISMS and ISO 27001 control items rather than modifying the ISMS.