• Title/Summary/Keyword: Personal management

Search Result 3,528, Processing Time 0.03 seconds

A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information (가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구)

  • Kim, Dong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • Recently, as personal information has been used as data, various new industries have been discovered, but cases of personal information leakage and misuse have occurred one after another due to insufficient systematic management system establishment. In addition, services that use personal information anonymously and anonymously have emerged since the enforcement of the Data 3 Act in August 2020, but personal information issues have arisen due to insufficient alias processing, safety measures for alias information processing, and insufficient hate expression. Therefore, this study proposed a new PbD principle that can be applied to the pseudonym information life cycle based on the Privacy by Design (PbD) principle proposed by Ann Cavoukian [1] of Canada to safely utilize personal information. In addition, the significance of the proposed method was confirmed through a survey of 30 experts related to personal information protection.

A Study on Improvement Plans for Application of the Personal Information Protection Act(Based on the Subject to Duty of Safeguards) (개인정보보호법 적용 대상에 대한 개선 방안 연구(안전성 확보조치 기준 의무 대상 중심으로))

  • Jang Sang Soo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.35-43
    • /
    • 2023
  • Since the Personal Information Protection Act was enacted in 2011, it has played a role in safely protecting people's personal information and protecting their rights. Personal information controller must comply with the duty of safeguards for safe personal information management. Even though administrative regulation is an accompanying issue, it is not clear to whom, when and how it applies. According to the imposition of duties, the scope, standards, safety measures, procedures, etc. for the target person should be clearly and specifically specified, but the current legal system is insufficient .In this study, problems and reasonable improvement plans were presented for the classification criteria for applicable subjects, the criteria for the criteria for determining the targets, and the criteria for measures to ensure safety. Through this, we intend to contribute to enhancing the effectiveness of the system by presenting reasonable measures by clarifying and specifying the scope and standards of application.

The Effects of Perceived Risk and Interactivity on User's Satisfaction and Commitment in Personal Media (1인 미디어의 지각된 위험 및 상호작용성이 사용자 만족과 몰입에 미치는 영향)

  • Chung, Young-Soo;Jung, Chul-Ho
    • Management & Information Systems Review
    • /
    • v.28 no.1
    • /
    • pp.125-156
    • /
    • 2009
  • The primary purpose of this study is to identify the determinants of the users' satisfaction and commitment in personal media. For these purposes, we developed a research model based on the literature reviews of personal media, perceived risk and interactivity, satisfaction, and commitment. This study has identified four dimensions in the concept of perceived risk, such as privacy risk, social risk, time loss risk, and economic risk, and three dimensions in the concept of perceived interactivity, such as active control, two-way communication, and responsiveness. In survey, data were collected from 428 male and female who have an experience in personal media. Data was analyzed factor analysis, reliability analysis, measurement model analysis, and structural model analysis by utilizing SPSS 15.0 and AMOS 5.0 program. Analysis results of research model indicate the following. Firstly, privacy risk, active control, two-way communication, and responsiveness are significantly related satisfaction. Secondly, privacy risk, time loss risk, economic risk, active control, and two-way communication are significantly related commitment. Thirdly, users' satisfaction has positive relationship with commitment in personal media. Based on these results, theoretical implications for relevant researchers and managerial implications for personal media vitalization and marketing strategy are discussed. Finally, limitations for this study and further research issues are suggested.

  • PDF

The Effect of Message Framing on Personal Relevance and Social Value Orientation - Focusing on Privatization - (개인 관련성과 사회적 가치 지향성이 광고 메시지 프레이밍에 미치는 효과 - 공기업 민영화를 중심으로 -)

  • Ju, Tae-Wook;Kim, Hyun-Seok
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.109-123
    • /
    • 2018
  • This research presented the privatization of pubic corporations in terms of communication dimension rather than political and ideological dimension. Concretely, we examined how the message framing of privatization affects consumer's advertising attitude. At the same time, this study also examined the moderating factors which make a difference of the message framing, such as personal relevance(high/low) and social value orientation(proself/prosocial). The results showed that the interaction effect between type of message framing and personal relevance. Positive message framing showed a higher effect than negative message in the case of low personal relevance. Also, There was the interaction effect between type of message framing and social value orientation. Positive message framing showed a higher effect than negative message in the case of proself. However, there was no difference in message framing effect when there was high personal relevance and prosocial. Lastly, the implications of this study was presented. First, this study expanded the scope of research related to message framing. Second, the use of moderating variables such as personal relevance and social value orientation increased the possibility of practical application. In addition, limitation and further study directions was discussed.

A Study on the Organization and Authority of the Personal Information Protection Commission (개인정보보호위원회의 조직과 권한에 관한 연구)

  • Kim, Ilhwan;Kim, Jaehyoun
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.149-156
    • /
    • 2015
  • The Personal Information Protection Commission shall be established under the direct jurisdiction of the President and shall independently perform affairs under its authority. It shall be comprised of total 15 members (5 members designated by the President, 5 members elected at the National Assembly and 5 members designated by the Chief Justice of the Supreme Court), including one minister-level Chairperson and one vice-minister-level standing member. Main functions of the Personal Information Protection Commission include deliberation and resolution of major policies and improvement of ordinances and systems related to personal information protection, coordination of opinions among public institutions in regards to the management of personal information, recommendation of improvement such as suspension of infringement by a central administrative agency, a local government and a constitutional institution, and submission of annual reports on personal information protection to the National Assembly. The function and role of the Personal Information Protection Commission regulated by the current law are insufficient in terms of independence and authorities of protection agencies compared to the international standard or level of discussion. The Commission thus cannot play a sufficient role as an independent agency for efficient protection of personal information. Therefore, there is a need for law revision that revives the purpose of the establishment of the Personal Information Protection Commission.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

The Proposal for Solution of Problems from Drone Operation by Examine Cases (사례로 살펴본 드론 활용 문제점에 따른 방향성 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.55-64
    • /
    • 2016
  • Recently, unmanned aerial vehicle, also known as drone is being used in variety of areas. Previously drones are used as military purposes. After unmanned technology went abroad to civil, drones are used as multipurpose such as hobby, business and other more. Even though drones are very useful in many areas, problems such as safety and personal privacy infringement raised new social issues. In this thesis it will analyze and suggest solutions to the social problems of personal privacy infringement which occurred by drone filming. This thesis will also suggest that new law of drone safety must legislate quickly. Drone is exploration of new filed. Varies of new technology help to grow drone industries. Drone is able to complete tasks which are impossible or very difficult to do. To constantly grow drone industries, people must have solutions for problems of drone. If people can figure out solutions problem of drone which introduced by this thesis, value of drone will grow even more.

The relationship between job burnout and service quality, and the moderating effect of self-efficacy (직무소진과 서비스품질의 관계와 그 관계에서 자기효능감의 조절효과)

  • Park, Roy C.;Ahn, Kwan Young
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.231-240
    • /
    • 2015
  • This paper reviewed the relationship between job burnout and service quality, and the moderating effect of self-efficacy. Based on the responses from 232 employees, the results of multiple regression analysis appeared as follow; 1) emotional exhaustion and depersonalization effected negatively on all service quality factors(empathy, reliability, responsiveness). 2) the reduced personal accomplishment effected negatively on two service quality factors(reliability, responsiveness). 3) self-efficacy effected positively on the relationship between emotional exhaustion and service quality. 4) self-efficacy effected positively on the relationship between he reduced personal accomplishment and service quality.

Customers' Awareness about Corporate Social Responsibility Activities of Hospital (병원의 사회적 책임활동에 대한 의료소비자의 인식)

  • Lee, Hyun Sook;Jin, Ki Nam;Kim, Jinjoo
    • Korea Journal of Hospital Management
    • /
    • v.17 no.4
    • /
    • pp.116-132
    • /
    • 2012
  • The purpose of this study is to discover the influence of customer's awareness toward corporate social responsibility(CSR) activities to service quality perception of the hospital. The survey was conducted on 211 patients at the general hospital in Seoul from April 2 to 30 in 2012. For the statistical analysis of data, ttest, ANOVA, and hierarchical multiple regression analysis were implemented. The results of the study were as follows. First, The personal tendency toward CSR was different by social groups. The elderly showed more tendency toward CSR. Second, there was a statistical significant relationship between the personal tendency toward CSR and the number of perceived CSR activities. Third, the effects of CSR activities were different from the perception of service quality. The awareness of volunteering social activities turned out to be negative factor of service quality perception.

  • PDF