• 제목/요약/키워드: Privacy Protection

검색결과 882건 처리시간 0.029초

정보사회에서의 소비자 개인정보보호에 관한 연구 (A Study on Consumer Personal Information in Information Society)

  • 남수정;김기옥
    • 대한가정학회지
    • /
    • 제37권10호
    • /
    • pp.55-66
    • /
    • 1999
  • The purpose of this study is to propose consumer policy related to the protection of personal information on the basis of regulations and laws in the developed countries. From this study, implications for the protection consumer privacy are discussed as follows. First, Consumer education is needed to enhance consumers'knowledge on their privacy right and this should be done not only by private consumer organization but also by businesses. Second, Businesses should realize ethical responsibilities of consumers'privacy right when they use personal information by databasemarketing. Finally, Government should establish a privacy law concerning both public and private sectors.

  • PDF

산부인과 간호사의 환자 프라이버시 보호행동에 관한 연구 (A Study on Protecting Patients' Privacy of Obstetric and Gynecologic Nurses)

  • 김미옥
    • 여성건강간호학회지
    • /
    • 제18권4호
    • /
    • pp.268-278
    • /
    • 2012
  • Purpose: This study aims to determine obstetric and gynecologic (OBGY) nurses' perception and performance propecting patients' privacy, and to contribute to develop educational program and improve the quality of nursing care. Methods: 206 OBGY nurses in 6 hospitals using an electronic medical record or an order communicating system were chosen by convenience sampling and agreed to participate in the study. The questionnaire, explored 4 domains of privacy: direct nursing, linked business, patient information management, communication with relatives. Results: Perception and performance of protecting patient privacy averaged 4.29 (of 5) and 3.55 (of 5), respectively. Most nurses (94.2%) recognized the importance of protecting patient privacy, 80.1% received patient privacy education. There was a distinct difference between the perception and performance of protecting patient privacy of nurses. Performance of protecting patient privacy had a positive correlation with perception. Conclusion: Proper performance of protecting privacy protection requires improving perception of each nurse on the patient privacy, and various efforts should be made to minimize the affect from external factors such as hospital environment. It is needed to educate nurses for patient privacy. It is also needed for medical organizations to improve their policies and facilities to ease the performance for privacy protection.

A Differential Privacy Approach to Preserve GWAS Data Sharing based on A Game Theoretic Perspective

  • Yan, Jun;Han, Ziwei;Zhou, Yihui;Lu, Laifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권3호
    • /
    • pp.1028-1046
    • /
    • 2022
  • Genome-wide association studies (GWAS) aim to find the significant genetic variants for common complex disease. However, genotype data has privacy information such as disease status and identity, which make data sharing and research difficult. Differential privacy is widely used in the privacy protection of data sharing. The current differential privacy approach in GWAS pays no attention to raw data but to statistical data, and doesn't achieve equilibrium between utility and privacy, so that data sharing is hindered and it hampers the development of genomics. To share data more securely, we propose a differential privacy preserving approach of data sharing for GWAS, and achieve the equilibrium between privacy and data utility. Firstly, a reasonable disturbance interval for the genotype is calculated based on the expected utility. Secondly, based on the interval, we get the Nash equilibrium point between utility and privacy. Finally, based on the equilibrium point, the original genotype matrix is perturbed with differential privacy, and the corresponding random genotype matrix is obtained. We theoretically and experimentally show that the method satisfies expected privacy protection and utility. This method provides engineering guidance for protecting GWAS data privacy.

학교도서관 이용자의 프라이버시에 대한 인식조사연구 (A Study on the Investigation of the Awareness for the Privacy of the Users at the School Libraries)

  • 심재윤;노영희
    • 한국비블리아학회지
    • /
    • 제26권4호
    • /
    • pp.31-63
    • /
    • 2015
  • 본 연구는 학교도서관 이용자 프라이버시에 대한 인식조사를 기반으로, 학교도서관 이용자의 개인정보보호 필요성을 제기하여 학교도서관 이용자 프라이버시에 대한 인식을 제고하는데 있다. 이를 위해 학생 프라이버시와 관련된 선행연구, 국내외 학생들의 프라이버시 보호를 위한 법적 근거 및 국내외 학생들의 개인정보보호 침해 유형 조사와 학생 프라이버시에 대한 인식을 조사하였다. 연구 결과, 첫째, 학교도서관 이용자 프라이버시에 대한 인식이 낮게 나타났으며, 학교도서관 이용자 프라이버시 침해 사례의 인식, 프라이버시 보호에 대한 인식, 이용자 프라이버시 문제에 대한 심각성, 이용자들의 프라이버시를 침해할 수 있는 요인들에 대해 낮은 인식을 보였다. 둘째, 학교도서관을 이용하는 이용자들의 도서관 기록이 외부로 유출되었을 때 느끼는 심각성에 대해서는 41.6%의 응답자들은 '심각하다'고 하였고, 18.4%는 심각하지 않다고 하였다. 셋째, 제 3자가 도서관 기록 열람을 요청할 경우, 본인의 동의가 필요한지에 대한 인식을 조사한 결과, 68.5%의 응답자가 '필요하다'고 하였고, 10.4%만이 필요하지 않다고 하였다. 넷째, 학교나 외부기관에서 이용자 프라이버시관련 교육을 받은 경험이 있는지에 대해 조사하였으며, 80% 이상의 응답자들이 받은 적이 없다고 하였다.

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

RBAC에 기초한 통합형 프라이버시 보호 모델 (Integrated Privacy Protection Model based on RBAC)

  • 조혁현;박희만;이영록;노봉남;이형효
    • 정보보호학회논문지
    • /
    • 제20권4호
    • /
    • pp.135-144
    • /
    • 2010
  • 프라이버시 보호는 기업의 온/오프-라인 데이터 처리 시스템 안에서 프라이버시 정책들을 수행할 수 있을 때에 달성될 수 있다. 프라이버시 정책 모델 중에는 P-RBAC과 목적모델, 의무모델이 있다. 그러나 이들 각각의 모델들만으로는 급변하는 기업환경에 능동적으로 대처하기 어렵다. 동일한 역할에 속해있는 사용자 중 최적의 조건을 만족하는 자만을 선발하여 일정기간 새로운 임무를 부여할 수 있어야하고, 풍부한 접근제약조건 표현을 허용하여 프라이버시 보호를 강화할 수 있어야 한다. 이를 위해 우리는 목적모델과 P-RBAC 모델, 의무모델을 통합시킨 통합형 프라이버시 보호 모델을 제안한다. 그리고 우리의 모델이 구현플랫폼과 응용에 종속적이지 않고 자동화될 수 있도록 XML 기반 정책언어모델을 정의한다.

Standard Implementation for Privacy Framework and Privacy Reference Architecture for Protecting Personally Identifiable Information

  • Shin, Yong-Nyuo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제11권3호
    • /
    • pp.197-203
    • /
    • 2011
  • Personal Identifiable Information (PII) is considered information that identifies or can be used to identify, contact, or locate a person to whom such information pertains or that is or might be linked to a natural person directly or indirectly. In order to recognize such data processed within information and communication technologies such as PII, it should be determined at which stage the information identifies, or can be associated with, an individual. For this, there has been ongoing research for privacy protection mechanism to protect PII, which now becomes one of hot issues in the International Standard as privacy framework and privacy reference architecture. Data processing flow models should be developed as an integral component of privacy risk assessments. Such diagrams are also the basis for categorizing PII. The data processing flow may not only show areas where the PII has a certain level of sensitivity or importance and, as a consequence, requires the implementation of stronger safeguarding measures. This paper propose a standard format for satisfying the ISO/IEC 29100 "Privacy Framework" and shows an implementation example for privacy reference architecture implementing privacy controls for the processing of PII in information and communication technology.

아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향 (A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection)

  • 김소라;이기춘
    • 대한가정학회지
    • /
    • 제45권8호
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.

개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석 (Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies)

  • 이재근;강상욱;염흥열
    • 정보보호학회논문지
    • /
    • 제23권4호
    • /
    • pp.767-779
    • /
    • 2013
  • 개인정보보호 분야는 타 분야에 비해 통계 및 현황에 대한 정보가 부족하다. 또한 개인정보보호 분야는 정보화, 정보보안, 법 등 어느 분야에도 일방적으로 속하지 않아 부수적으로만 실태 파악이 되고 있어 앞으로도 한계가 있을 것이다. 본 논문에서는 약 11만 개의 개인정보처리자가 공개하고 있는 개인정보 처리방침을 이용하여 방대한 양의 데이터를 수집하고 저장하여 이를 분석할 수 있는 방안을 제시하고 실제 결과를 보여준다. 제시된 방안은 데이터의 품질이 보장되고 시간과 비용을 절감할 수 있어 기존 방식에 비해 결과에 대한 정확성과 현황 파악에 대한 신속성에 있어 유리하다. 또한 다양한 분석이 가능하여 개인정보보호에 대한 실태 파악의 새로운 돌파구 역할을 할 수 있다. 본 논문에서는 개인정보보호와 빅데이터 분야의 접목을 통해 개인정보보호의 발전 방안을 제시하고 있다.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.