• Title/Summary/Keyword: Personal management

Search Result 3,533, Processing Time 0.023 seconds

주관적 구강보건지식과 구강건강행태가 개인구강위생관리능력에 미치는 영향 (The Effect of Subjective Oral Health Knowledge and Oral Health Behavior on Personal Oral Hygiene Management Ability)

  • 최정미;이은주;권수진
    • 보건의료산업학회지
    • /
    • 제8권2호
    • /
    • pp.221-232
    • /
    • 2014
  • This research aims to improve oral health knowledge through oral health education by investigating and analyzing the effect of subjective oral health knowledge and oral health behavior on personal oral hygiene management ability targeted for adults who visited a dental hygiene laboratory at B University in Busan for comprehensive dental hygiene management and procedure from September 23, 2013 to December 12, 2013, and provide basic data to improve adults' personal oral hygiene management ability by inducing behavior on oral health. Results derived from the research are as follows. Oral health education is a prerequisite to improve personal oral hygiene management ability through improvement in oral health knowledge and oral health behavior, which leads to improved personal oral health and furthermore promotion of national oral health through not just simply transmitting oral health knowledge, but desirable change in oral health behavior based on oral health knowledge.

개인정보보호 강화를 위한 위탁 업무 보안관리 프레임웍 제안 (A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information)

  • 고영대;이상진
    • 정보보호학회논문지
    • /
    • 제25권2호
    • /
    • pp.383-393
    • /
    • 2015
  • 최근 개인정보를 취급하는 개인정보처리자의 비용절감, 전문성을 통한 업무효율성의 증대 및 서비스 품질 개선 등의 다양한 목적에 따라 개인정보의 처리 업무를 제3자에게 위탁하는 경우가 늘어나고 있다. 이렇듯, 정보주체의 개인정보가 개인정보처리자가 아닌 제3자에 의하여 이루어지는 위탁업무가 증가함에 따라 개인정보를 위탁받아 처리하는 수탁사에 대한 개인정보보호에 대한 관심과 노력 또한 당연히 증대되어야 할 것이다. 이에, 본 논문에서는 이러한 취지에 기반하여 개인정보 위수탁 업무 진행 시 수탁사를 위한 효율적인 관리방안 뿐만 아니라, 위탁사가 위수탁 업무 전반에 걸쳐 개인정보보호 프레임웍을 정립하고 이를 토대로 수탁 업체 선정 및 계약 단계에서부터 위수탁 업무 운영 및 관리, 위수탁 업무 계약 해지 및 종료에 이르는 각 단계에서 고려해야할 개인정보보호 요건들을 제안하고자 한다.

공·사립 유치원 홈페이지의 운영 및 개인정보 관리 실태 연구 (A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages)

  • 김종민;천희영;최은아
    • 아동학회지
    • /
    • 제37권6호
    • /
    • pp.119-132
    • /
    • 2016
  • Objective: The purpose of this study was to analyze the operation and personal information management of public and private kindergarten homepages. Methods: A total of 2,846 kindergartens were selected from the I-Sarang portal service for analyzing operation, and 217 self-operating homepages were selected for evaluating management. Seven evaluation items from three domains (information gathering procedures and scope, information security, and management of file exposure protection) were used. Wireshark and Google were used for analyzing some evaluation items. Results: The operating ratio of kindergarten homepages was low and most of the kindergartens self-operated their homepages. The evaluation of the information gathering procedures and scope showed that the rule of consent process was not rigidly followed but that the rule of legality for information gathering was followed. Items related to information security were followed at very low levels. As for the management of file exposure protection, the evaluation of items related to the prevention of attachment disclosure showed that the rule of protecting personal information included in an attached file was followed but that the notice regarding information protection was not. Across all evaluation items, the level of personal information management was higher in public (vs. private) kindergartens. Conclusion: These results indicate methods to more securely and effectively manage personal information on kindergarten homepages.

퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가 (Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments)

  • 진병욱;김종화;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

개인 기록의 특성과 기록화 전략 (The Nature of Personal Papers and Documentation Strategies for Personal Archives)

  • 오명진
    • 기록학연구
    • /
    • 제53호
    • /
    • pp.79-117
    • /
    • 2017
  • 개인 기록은 "기록"으로서의 일반적 특성과 "개인"이라는 맥락이 부여한 고유한 특성을 공유하고 있다. 이 글은 그 중에서도 고유한 특성에 관한 주목이 필요하며 개인 기록 관리에 관한 다양한 방법들을 결정하기 위해서는 개인 기록이 갖는 고유한 특성을 구체적으로 고찰해야 한다는 문제 의식에서 시작되었다. 이에 이 글은 개인 기록이 갖는 특성을 밝히기 위하여 두 가지 방법의 접근을 시도하였다. 먼저, 기록관리의 가장 기본적인 원칙을 담고 있는 표준인 ISO 15489: 2016와 개인 기록과 관련된 문헌 연구들을 중심으로 개인 기록의 생산 맥락, 기록관리 과정에서 살펴볼 수 있는 개인 기록의 고유한 특성을 살펴보았다. 다음으로 사람의 독특한 성질인 "성격(personality)"과 관련된 이론을 검토하고 개인 기록 관리에서의 적용 필요성을 검토했다. 아울러 국내의 기록 관리기관이 소장하고 있는 실제 개인에 관한 기록 군에서 성격을 중심으로 개인적 특성을 살펴보고 이것이 기록 관리에 어떤 영향을 주고 있는지를 확인해 보았다. 개인 기록이 갖는 고유한 특성이야말로 기록화 활동에 있어 수집대상에 대한 이해와 전략의 기반이 되어야 한다고 생각된다. 이를 위해서는 개인 기록이 가진 특성을 다양한 차원에서 발견하기 위한 노력이 우선적으로 필요하며 이를 개인 기록을 기록화하기 위한 전략의 핵심으로서 확보해 나가야 할 것이다.

마이데이터 모델을 활용한 개인정보 이용내역 통지 방안 연구 (A Study on Notification Method of Personal Information Usage History using MyData Model)

  • 김태경;정성민
    • 디지털산업정보학회논문지
    • /
    • 제18권1호
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the 4th industry, big data using AI is being used in many areas of our lives, and the importance of data is increasing accordingly. In particular, as various services using personal information appear and hacking attacks that exploit them appear in various ways, the importance of personal information management is increasing. Personal information must be managed safely even when collecting, retaining, using, providing, and destroying personal information, and the rights of information subjects must be protected. In this paper, an analysis was performed on the notification of usage history during the protection of the rights of information subjects using the MyData model. According to the Personal Information Protection Act, users must be periodically notified of the use of personal information, so we notify each individual of the use of personal information through e-mail or SNS once a year. It is difficult to understand and manage which company use my personal information. Therefore, in this paper, a personal information usage history notification system model was proposed, and as a result of performance analysis, it is possible to provide the controllability, availability, integrity, source authentication, and personal information self-determination rights.

개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구 (Personal Information Management System (PIMS) improvement research using cloud computing security)

  • 정혜인;김성준
    • 디지털산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로 (Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives)

  • 지범석;판류;이상철;서영호
    • 품질경영학회지
    • /
    • 제39권3호
    • /
    • pp.432-443
    • /
    • 2011
  • The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.

모듈기반 퍼스널 로봇의 결함 허용 지원을 위한 네트워크 연결 유지 관리 기법 (Method of network connection management in module based personal robot for fault-tolerant)

  • 최동희;박홍성
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.300-302
    • /
    • 2006
  • Middleware offers function that user application program can transmit data independently of network device. Connection management about network connection of module is important for normal service of module base personal robot. Unpredictable network disconnection is influenced to whole robot performance in module base personal robot. For this, Middleware must be offer two important function. The first is function of error detection and reporting about abnormal network disconnection. Therefore, middleware need method for network error detection and module management to consider special quality that each network device has. The second is the function recovering that makes the regular service possible. When the module closed from connection reconnects, as this service reports connection state of the corresponding module, the personal robot resumes the existing service. In this paper proposed method of network connection management for to support fault tolerant about network error of network module based personal robot.

  • PDF