• Title/Summary/Keyword: Personal management

Search Result 3,533, Processing Time 0.025 seconds

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

An Empirical Study on the Factors that Affect the Continuous Use Intention of i-PIN (아이핀(i-PIN)의 지속적 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Im, Hyuk;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.159-179
    • /
    • 2015
  • In 2005, Korean government created the Internet Personal Identification Number (i-PIN) for a new online personal identification system to protect citizens' personal information against criminal abuse. However, i-PINs have not been widely in use over a decade. Although many people joined the i-PIN service, its actual use rate has been low. This study intends to identify the factors necessary to boost the continuous use of i-PINs. It was shown that government support and perceived security had a positive effect on the perceived ease of use and perceived usefulness of the i-PIN, respectively. Perceived security also directly affected the continuous use intention of the i-PIN. The perceived ease of use significantly affected the perceived usefulness, but it did not affect the intention to continuously use the i-PIN. The factor that had the most significant influence on the continuous use intention of the i-PIN was perceived usefulness. To increase the i-PIN use rate, Korean government must reduce users' anxiety through strict security functions, and must attempt to help people use the i-PIN easily.

A Study on the Determinants of the Salespeople's Sales Performance (영업사원의 영업성과 영향요인에 관한 연구 : 의료기 영업사원을 대상으로)

  • Kim, Kyu-Dong;Kim, Jeung-Lae;Lee, Woo-Cheol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.6
    • /
    • pp.1545-1553
    • /
    • 2012
  • Good salespeople are the deciding factors in the success of an organization. In particular, the role of the salesperson takes on a more important role. Accordingly, the first purpose of this study is to understand the personal values of salespeople; secondly, to study the explanation personal values, adaptability, and customer orientation have on salesperson's performance. The third purpose is to understand the structural link among each of the explanatory factors related to salesperson performance. Lastly, with these research results as a foundation, to find the implications regarding management strategy plans of valuable salespeople for marketing researchers and sales managers.

What are the Individual's Real Cares to Switch Personal Cloud Services?

  • Luo, Weiyi;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.23 no.2
    • /
    • pp.109-137
    • /
    • 2014
  • As the fast development of information technology (IT), abundant attractive alternatives have showed up and challenged to the traditional information technology (IT). Cloud services, the hottest representative among these alternatives, has attracted the attention from all walks of life. Considering the diversity of cloud services, this study attempts to find out the important factors affected on individual's switching intention from incumbent IT to cloud services mainly based on two-factor theory (switching enablers and switching inhibitors) and explore the direct influences of these factors on individual's switching intention. According to our findings, individual's switching intention to cloud services is not only positively influenced by switching enablers but also negatively influenced by switching inhibitors. All the switching enablers in this study (perceived omnipresence, perceived collaboration support and perceived compatibility of cloud services) have positively significant influences on individual's switching intention as well as the switching inhibitors (usage habit of incumbent IT and perceived risk of cloud services) have negatively significant influences on individual's switching intention. It's noteworthy that satisfaction of incumbent IT has insignificant influence on individual's switching intention in this study. Moreover, as we expected, both social influence and personal innovativeness have significant influences on the generation of individual's switching intention.

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

Development of Secure Access Control System for Location Information on Smart Phone (스마트폰 위치정보에 대한 안전한 접근제어 시스템 개발)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.139-147
    • /
    • 2011
  • More convenient and value-added application services can be provided to user in case of using location-based service on Smart phone. However, privacy problem will be happen when an application disclosures the personal location information. Therefore, each user should securely control and manage his own personal location information by specifying access control list and profiles. In this study, we implemented personal location information self-control protocol and developed secure personal location management system with OTP based authentication procedure.

FAIR-Based Loss Measurement Caused by Personal Information Breach of a Company (FAIR를 통한 개인정보 유출에 따른 기업의 손해금액 산출에 대한 연구)

  • Kim, Jeong-Gyu;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.129-145
    • /
    • 2017
  • This study proposes a methodology to estimate the financial damages by personal information breach of a company and to analyse risk systematically through a case study of a company which experiences private information breach. Using FAIR(Factor Analysis of Information Risk) model, estimate the loss amount and to analyse risk objectively of a company by personal information breach. This study estimates adequacy and importance of corresponding factors applying AHP(Analytic Hierarchy Process) on each factors for assessing loss amount. By adopting proposed methodology in this study, the person in charge of actual work can assess and prove the loss amount though the latest risk estimation methodology. In addition, the person in charge can select the proper parameters for the corresponding company and can obtain the objective quantitative estimation. Hence it can be reported to the management by accurately assessing loss amount caused by personal information breach.

An Empirical Research on Information Privacy and Trust Model in the Convergence Era (융복합 시대의 정보 프라이버시와 신뢰 모델에 대한 실증 연구)

  • Park, Cheon-Woong;Kim, Jun-Woo
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.219-225
    • /
    • 2015
  • There has been an exponential growth in the distribution and possession of sensitive information because of the emergence of various information channels such as smart devices, social media, etc. This enables the internet based web or mobile service operation institutions collecting the more personal information with ease, and in turn causes the issues of the privacy concerns. Followings are the results of this study: First, the information privacy concern has the negative effects upon the trust. Second, the information privacy concern has the negative effects upon the provision intention of personal information and the trust has positive effects upon the offering intention of personal information. At last, the offering intention of the personal information has the positive effects upon the behavior to provide the personal information.

Relations of Job Satisfaction with Emotional Labor, Job Stress, and Personal Resources in Home Healthcare Nurses (가정전문간호사의 감정노동, 직무 스트레스, 개인적 자원의 직무만족도와의 관련성)

  • Park, Mi Mi;Han, Suk Jung
    • Research in Community and Public Health Nursing
    • /
    • v.24 no.1
    • /
    • pp.51-61
    • /
    • 2013
  • Purpose: The aim of this study is to identify effects of emotional labor, job stress and personal resources on job satisfaction in home healthcare nurses. Methods: The subjects were 149 home healthcare nurses working for home healthcare centers at 61 hospitals. Data were collected using a structured questionnaire from November 22, 2010 to February 28, 2011 and analyzed with descriptive statistics, t-test, ANOVA, Pearson's correlation, Hierarchical multiple linear regression analysis. Results: The mean score of emotional labor level was $4.23{\pm}0.95$, that of job stress level $3.39{\pm}0.57$, that of personal resources $3.38{\pm}0.36$, and that of job satisfaction $3.31{\pm}0.40$. There were positive correlations among emotional labor, job stress, personal resources and job satisfaction. After age, educational level, job position, and work period in home health care, and traffic accident were controlled, the variables, emotional labor (${\beta}$=-.198, p = .034) and personal resources (${\beta}$=.236, p = .005) turned out to account for 13.3% of the job satisfaction. But job stress was not a statistically significant predictor. Conclusion: Home healthcare nurses were needed to minimize emotional labor and revitalize personal resources in order to maintain a comparatively high level of job satisfaction. Furthermore, it is necessary to carry out systematic education and an organizational management scheme into practice.

De-identification Techniques for Big Data and Issues (빅데이타 비식별화 기술과 이슈)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.750-753
    • /
    • 2017
  • Recently, the processing and utilization of big data, which is generated by the spread of smartphone, SNS, and the internet of things, is emerging as a new growth engine of ICT field. However, in order to utilize such big data, De-identification of personal information should be done. De-identification removes identifying information from a data set so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or publishing information, thus it attempts to balance the contradictory goals of using and sharing personal information while protecting privacy. De-identified information has also been re-identified and has been controversial for the protection of personal information, but the number of instances where personal information such as big data is de-identified and processed is increasing. In addition, many de-identification guidelines have been introduced and a method for de-identification of personal information has been proposed. Therefore, in this study, we describe the big data de-identification process and follow-up management, and then compare and analyze de-identification methods. Finally we provide personal information protection issues and solutions.

  • PDF