• Title/Summary/Keyword: Privacy Law

Search Result 160, Processing Time 0.028 seconds

Analysis of the recognition level of personal information protection of public institutions in the local governments (지방자치단체 공공기관의 개인정보보호에 관한 인식 수준 분석)

  • Jang, Ji-Hye;Mok, Hwa-Jung;Kim, Yeon-Seo;Choi, Jin-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.345-350
    • /
    • 2016
  • It is the personal information protection law is prepared, in the government, to develop a personal information protection basic plan has been implemented. However, year after year, complaints caused by infringement of personal information in public institutions has increased. In this paper, the recognition level of analysis related to the protection of personal information of local governments, public institutions through a questionnaire survey, raised the need for improvement.

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

Construction of LAN Using Asynchronous Code Division Multiplexing by Spread Spectrum Technique and a New Scheme of Cancelling Co-channel Interference (스펙트럼 확산 통신방식을 이용한 타국간 간섭제거 비동기 부호 분할 LAN의 구성)

  • 이동욱;변건식;김명기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.6
    • /
    • pp.729-743
    • /
    • 1989
  • A spread spectrum(ss) communication system has a lot of advantage, such as realzation of asynchronous code division multiplexing(CDM), robutness to narrow-band interference, impulse noise, privacy function, and so on. We have considered utilization of these advantage to develop a local area network(LAN) using such a transmission channel as power-line. In a power-line, however, restricted bandwidth under the law makes it difficult to carry out CDM, and in a radio channel the sysstem has a near-far problem. These problems originate in co-channel interference, which is due to cross-correlation among pseudo-noise sequences of every channel in CDM. In this paper, we propose a new scheme of easily cancelling co-channel interference and investigate its performance by constructing a LAN using SS technique.

  • PDF

An Impact and Problem by the Personal Information Protection Act. on the Financial Sector (개인정보보호법이 금융권에 미치는 영향과 문제점에 관한 고찰)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.31-36
    • /
    • 2013
  • The personal information protection act has been enacted from 2011 for the protection of public and private privacy. Since the application area of the law is so broad, there is a limit to covers everything in the financial field. In this paper, I'll discuss an impact and problem by the personal information protection act. and propose some new task to build an efficient personal information protection governance on financial sector.

Recognition and attitude of paramedic students regarding patient privacy protection (응급구조(학)과 학생들의 환자 개인정보보호에 대한 인식 및 태도)

  • Shin, Yo-Han;Kim, Jung-Sun;Kim, Bo-Kyun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.25 no.2
    • /
    • pp.113-128
    • /
    • 2021
  • Purpose: This study sought to analyze perceptions and attitudes regarding patient personal information protection according to the general characteristics of paramedic students and their clinical practice experience. Methods: A total of 215 paramedic students from G university in I metropolitan city and D university in G do were surveyed. Frequency analysis, percentage analysis, and one-way distribution analysis were conducted using the software SPSS version 23.0. Results: First, recognition regarding the operation of laws and systems related to medical law and personal information protection was high among students who had no clinical practice experience, and there were no differences with regard to students' general characteristics. Second, the level of recognition regarding patient personal information protection and exposure did not differ depending on students' general characteristics and clinical practice experience. Conclusion: Based on the results of this study, students' recognition and attitude should be improved by carrying out continuous education on patient personal information protection. Furthermore, more specialized and systematic training related to patient personal information protection should be conducted to nurture appropriately trained paramedic students.

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

A Systematic Review of Big Data: Research Approaches and Future Prospects

  • Cobanoglu, Cihan;Terrah, Abraham;Hsu, Meng-Jun;Corte, Valentina Della;Gaudio, Giovanna Del
    • Journal of Smart Tourism
    • /
    • v.2 no.1
    • /
    • pp.21-31
    • /
    • 2022
  • This review paper aims at providing a systematic analysis of articles published in various journals and related to the uses and business applications of big data. The goal is to provide a holistic picture of the place of big data in the tourism industry. The reviewed articles have been selected for the period 2013-2020 and have been classified into 8 broad categories namely business strategy and firm performance; banking and finance; healthcare; hospitality; networks and telecommunications; urbanism and infrastructures; law and legal regulations; and government. While the categories are reflective of components of tourism industries and infrastructures, the meta-analysis is organized around 3 broad themes: preferred research contexts, conceptual developments, and methods used to research big data business applications. Main findings revealed that firm performance and healthcare remain popular contexts of research in the big data realm, but also demonstrated a prominence of qualitative methods over mixed and quantitative methods for the period 2013-2020. Scholars have also investigated topics involving the notions of competitive advantage, supply chain management, smart cities, but also ethics and privacy issues as related to the use of big data.

AI-Enabled Business Models and Innovations: A Systematic Literature Review

  • Taoer Yang;Aqsa;Rafaqat Kazmi;Karthik Rajashekaran
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1518-1539
    • /
    • 2024
  • Artificial intelligence-enabled business models aim to improve decision-making, operational efficiency, innovation, and productivity. The presented systematic literature review is conducted to highlight elucidating the utilization of artificial intelligence (AI) methods and techniques within AI-enabled businesses, the significance and functions of AI-enabled organizational models and frameworks, and the design parameters employed in academic research studies within the AI-enabled business domain. We reviewed 39 empirical studies that were published between 2010 and 2023. The studies that were chosen are classified based on the artificial intelligence business technique, empirical research design, and SLR search protocol criteria. According to the findings, machine learning and artificial intelligence were reported as popular methods used for business process modelling in 19% of the studies. Healthcare was the most experimented business domain used for empirical evaluation in 28% of the primary research. The most common reason for using artificial intelligence in businesses was to improve business intelligence. 51% of main studies claimed to have been carried out as experiments. 53% of the research followed experimental guidelines and were repeatable. For the design of business process modelling, eighteen AI mythology were discovered, as well as seven types of AI modelling goals and principles for organisations. For AI-enabled business models, safety, security, and privacy are key concerns in society. The growth of AI is influencing novel forms of business.

A Study on the Australian Law Regarding RPAS (Remotely Piloted Aircraft System): Need for an International Approach

  • Wheeler, Joseph;Lee, Jae-Woon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.311-336
    • /
    • 2015
  • This article surveys the current international law with respect to RPAS from both the public air law and private air law perspectives. It then reviews current and proposed Australian domestic RPAS regulation while emphasizing the peculiar risks in operation of RPAS; and how they affect concepts of liability, safety and privacy. While RPAS operations still constitute only a small portion of total operations within commercial aviation, international pilotless flight for commercial air transport remains a future reality. As the industry is developing so quickly the earlier the pursuit of the right policy solutions begins, the better the law will be able to cope with the technological realities when the inevitable risks manifest in accidents. The paper acknowledges that a domestic or regional approach to RPAS, typified by the legislative success of the Australian experience, is and continues to be the principal measure to deal with RPAS issues globally. Furthermore, safety remains the foremost factor in present and revised Australian RPAS regulation. This has an analogue to the international situation. Creating safety-related rules is imperative and must precede the creation or adoption of liability rules because the former mitigates the risk of accidents which trigger the application of the latter. The flipside of a lack of binding airworthiness standards for RPAS operators is potentially a strong argument that the liability regime (and particularly strict liability of operators) is unfair and unsuited to pilotless flight. The potential solutions the authors raise include the need for revised ICAO guidance and, in particular, SARPs with respect to RPAS air safety, airworthiness, and potentially liability issues for participants/passengers, and those on the ground. Such guidance could then be adapted swiftly for appropriate incorporation into domestic laws bypassing the need for or administrative burden and time it would take to activate the treaty process to deal with an arm of aviation that states know all too well is in need of safety regulation and monitoring.

A Study on the Organization and Authority of the Personal Information Protection Commission (개인정보보호위원회의 조직과 권한에 관한 연구)

  • Kim, Ilhwan;Kim, Jaehyoun
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.149-156
    • /
    • 2015
  • The Personal Information Protection Commission shall be established under the direct jurisdiction of the President and shall independently perform affairs under its authority. It shall be comprised of total 15 members (5 members designated by the President, 5 members elected at the National Assembly and 5 members designated by the Chief Justice of the Supreme Court), including one minister-level Chairperson and one vice-minister-level standing member. Main functions of the Personal Information Protection Commission include deliberation and resolution of major policies and improvement of ordinances and systems related to personal information protection, coordination of opinions among public institutions in regards to the management of personal information, recommendation of improvement such as suspension of infringement by a central administrative agency, a local government and a constitutional institution, and submission of annual reports on personal information protection to the National Assembly. The function and role of the Personal Information Protection Commission regulated by the current law are insufficient in terms of independence and authorities of protection agencies compared to the international standard or level of discussion. The Commission thus cannot play a sufficient role as an independent agency for efficient protection of personal information. Therefore, there is a need for law revision that revives the purpose of the establishment of the Personal Information Protection Commission.