• Title/Summary/Keyword: Personal information protection management

Search Result 269, Processing Time 0.022 seconds

"COVID-19 : Our Memory" : A Digital Archive for Social Changes caused by SARS-CoV-2 ("코로나-19 : 우리의 기억" : 코로나바이러스 감염증과 사회변화에 대한 디지털 아카이브)

  • Kim, Haklae
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.20 no.4
    • /
    • pp.229-236
    • /
    • 2020
  • In light of SARS-CoV-2's significant impact, human society has experienced rapid changes in lifestyle that it has not yet experienced before. One way this virus has influenced people's lives is the emergence of the zero-contact society, an initiative for preventing the spread of infectious diseases. As can be seen, the social impact of COVID-19 is widespread. Various issues, such as those about government policy, personal information protection, and health care, are affecting society as a whole. At the same time, factual information is difficult to track and record because of the rapid and transient nature of related events and issues. As such, a method of effectively describing COVID-19 and real-time information is necessary. The "COVID-19: Our Memory" project is an attempt to record the sociocultural impact of the coronavirus infection. This project collects major events and issues classified into several subjects, records those events from a neutral point of view, and develops a digital archive so that all records are accessible. All the data collected and built through the project, the application, including the source code and visualization, are all published to bring about new opportunities for collaboration.

Identifying Social Relationships using Text Analysis for Social Chatbots (소셜챗봇 구축에 필요한 관계성 추론을 위한 텍스트마이닝 방법)

  • Kim, Jeonghun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.85-110
    • /
    • 2018
  • A chatbot is an interactive assistant that utilizes many communication modes: voice, images, video, or text. It is an artificial intelligence-based application that responds to users' needs or solves problems during user-friendly conversation. However, the current version of the chatbot is focused on understanding and performing tasks requested by the user; its ability to generate personalized conversation suitable for relationship-building is limited. Recognizing the need to build a relationship and making suitable conversation is more important for social chatbots who require social skills similar to those of problem-solving chatbots like the intelligent personal assistant. The purpose of this study is to propose a text analysis method that evaluates relationships between chatbots and users based on content input by the user and adapted to the communication situation, enabling the chatbot to conduct suitable conversations. To evaluate the performance of this method, we examined learning and verified the results using actual SNS conversation records. The results of the analysis will aid in implementation of the social chatbot, as this method yields excellent results even when the private profile information of the user is excluded for privacy reasons.

A Study on the Analysis and the Improvement of the MyData System from a Consumer Behavior Perspective (소비자행동 측면에서의 마이데이터 제도 분석 및 개선방안 연구)

  • Young-Jong Lee;Seong-Yeob Lee
    • Industry Promotion Research
    • /
    • v.9 no.3
    • /
    • pp.163-174
    • /
    • 2024
  • MyData is a new entity that strengthens the rights of information subjects through the 'right to data portability' and utilizes data to enable hyper-personalized services using personal information. Korea's MyData system is recognized globally as an outstanding system in that it is creating a new MyData industry by granting the right to information self-determination through the 'right to request data transmission'. Now in its third year, this study evaluates Korea's MyData system from a consumer behavior perspective and identifies issues for improvement. To this end, this study reviewed previous research on the relationship between regulatory policy and consumer behavior to determine the applicability of a consumer behavior perspective in institutional evaluation. In addition, in a study on consumer behavior related to MyData, variables that affect the use of MyData were investigated and evaluation items from a consumer behavior perspective were derived. As a result of evaluating Korea's MyData system from a consumer behavior perspective, it was found that the factors considered important by consumers were appropriately reflected in the system. However, in cases where there are dual values of ease of use and personal information protection, regulatory aspects tend to take priority. Therefore, in order to revitalize the MyData industry, it is essential to implement market-friendly system improvements without compromising consumer rights. This study is differentiated from existing studies in that it attempted to derive a plan for system improvement by combining empirical consumer behavior research and regulatory policy research.

Effect of Demographic Factors, Radiation Knowledge Level, Radiation Awareness on Radiation Benefit by Hierarchical Regression Analysis Model (위계적 회귀분석 모형에 의한 인구학적 요인, 방사선 지식수준, 방사선 인식도가 방사선 이익성에 미치는 영향)

  • Myeong-Hoon Ji;Youl-Hun Seoung
    • Journal of radiological science and technology
    • /
    • v.46 no.5
    • /
    • pp.435-444
    • /
    • 2023
  • The purpose of this study was to analyze the factors that demographic factors, radiation knowledge level, and radiation awareness could be affecting the benefits of radiation. From July 2022 to July 2023, after receiving consent to participate by using the link of Naver through Social Network Service (SNS) for the general public, 312 people were surveyed by self-registration method without collecting personal information. The questionnaire consisted of a total of 25 questions following demographic factors (5 questions including age group by life cycle, sex, monthly household income, residence), radiation knowledge level (8 questions including basic physical, biological effects, radiation protection technology), radiation awareness (12 questions including risk, management, benefit). Independent sample T-test and ANOVA tests were performed for significant differences in the average radiation awareness between variables, and hierarchical regression was performed to identify influencing factors on radiation benefits. As a result, the benefit of radiation was significantly high among the radiation awareness, but the awareness of the danger of radiation was insufficient to the level of recognizing it as safe. Men had significantly higher awareness of radiation management and benefits than women, and the awareness of radiation management was significantly higher in the middle class with a monthly household income of 4.31 million won or more. The higher the knowledge level of radiation, the higher the awareness of the benefits of radiation. The factors that had a positive effect on radiation benefits were the high level of radiation knowledge and awareness of radiation management.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

A Study on the Video Privacy Protective Mechanism (영상 프라이버시 보호 메커니즘에 관한 연구)

  • Kim, Minsu;Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.49-55
    • /
    • 2017
  • In case of security of IoT-based areas in ICBM industry, the anxiety about safety goes to extremes in public and national safety area, so that the demand for security service related to disaster/safety management is increasing. Like this, as a security service for safety, CCTVs are installed/operated for the purpose of maintenance of public order and crime prevention. Especially, as the recorded images are presented as crucial evidences of crimes, they are rapidly increasing. However, as adverse effects of CCTVs, it is highly possible to unintentionally leak personal information in the process of performing the original purpose, or to violate someone's privacy in case when such technologies are abused. Therefore, it would be necessary to have researches on the multilaterally-combined mechanism for the protection of image privacy.

Knowledge Creation Structure of Big Data Research Domain (빅데이터 연구영역의 지식창출 구조)

  • Namn, Su-Hyeon
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.129-136
    • /
    • 2015
  • We investigate the underlying structure of big data research domain, which is diversified and complicated using bottom-up approach. For that purpose, we derive a set of articles by searching "big data" through the Korea Citation Index System provided by National Research Foundation of Korea. With some preprocessing on the author-provided keywords, we analyze bibliometric data such as author-provided keywords, publication year, author, and journal characteristics. From the analysis, we both identify major sub-domains of big data research area and discover the hidden issues which made big data complex. Major keywords identified include SOCIAL NETWORK ANALYSIS, HADOOP, MAPREDUCE, PERSONAL INFORMATION POLICY/PROTECTION/PRIVATE INFORMATION, CLOUD COMPUTING, VISUALIZATION, and DATA MINING. We finally suggest missing research themes to make big data a sustainable management innovation and convergence medium.

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.