• Title/Summary/Keyword: Privacy policy

Search Result 408, Processing Time 0.946 seconds

Privacy Policy (개인정보보호정책)

  • 임태훈;오상훈
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2000.08a
    • /
    • pp.197-200
    • /
    • 2000
  • 현재 데이터베이스업체들은 이용자들에게 과도한 정보를 요구하고 있으며, 개인정보보호지침을 준수하고 있지 않다는 지적을 받고 있다. 실제로 업계의 실태를 조사한 결과, 많은 업체들이 과도한 개인정보를 요구하고 있었으며, 대부분 개인정보보호정책을 마련해 놓고 있지 않았다. 업체들이 갖추어야하는 개인정보보호정책에는 개인정보 수집목적, 수집항목, 정보의 열람 및 정정, 어린이 개인정보 등에 관한 내용이 포함되어야 한다.

  • PDF

The Study of Private and Public Nature in Household Work (가사노동의 사적 특성과 공적 특성에 대한 연구)

  • 문숙재
    • Journal of the Korean Home Economics Association
    • /
    • v.34 no.3
    • /
    • pp.199-210
    • /
    • 1996
  • This study is planned to investigate a discussion of private and public nature in household realm. For this purpose, first of all, study precedent concerning the household work and the private and public nature is reviewed. Second, the origin on the privacy of household work and it's relationship of the public part are investigated. Third, it is implicated that through the politicization of household work, it is enable to establish new insight of household work in the family policy.

  • PDF

A Study on Adoption and Policy Direction of Blockchain Technology in Financial Industry (금융분야의 블록체인기술 활용과 정책방향에 관한 연구)

  • Park, Jeong Kuk;Kim, Injai
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.33-44
    • /
    • 2017
  • The financial industry recently introduces several issues for utilizing the blockchain technology as the core infrastructure of future finance. Blockchain, first introduced as the underlying technology of Crypto-currencies, Bitcoin is a technology that can ensure the integrity and reliability of data by verifying, recording, and storing data jointly in the network without a central administration organization or a manager. This blockchain has its potential power as a technology for issuing digital currencies, providing transparency, and securing record management, that is expected to be useful in the financial sector. At the same time, considering the characteristics of financial transactions which emphasize privacy, questions are raised about whether a blockchain structure in which information is distributed and shared among participants can be successful. How will we support to implement the potential of the blockchain in order to change the paradigm of the financial industry? How can we manage the side effects of blockchain effectively? Such a policy discussion is necessary. This study introduces the meaning of the blockchain technology, various utilization attempts, and possible problems facing technology from the viewpoint of financial industry, and suggests a policy direction for utilizing this technology as a catalyst to the progress of the financial industry or as a new technology power.

A Study on Design for Efficient Personal Policy of Service based RBAC (서비스 기반 RBAC의 효율적인 개인별 정책 설계에 관한 연구)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.191-196
    • /
    • 2016
  • The organizations and companies establish personal information protection policy under the law and guidelines. They carry out access control without consideration for distinctiveness of the information although the damage degree varies when the information is leaked. Considering the distinctiveness, a policy needs to be made for individuals to protect his personal information. However, he is not able to write the policy because of lack of understanding the system. To write his own policy efficiently, the system that authorizes ones according to service list provided by organizations is necessary. This paper suggests the model and method that write personal policy for his information protection based on the service list provided by organizations. Through this model, fine-grained authorization and policy change are easily made and ultimately the access control customized according to one's own information is possible.

A RBAC-based Access Control Framework in OSGi Service Platform (OSGi 서비스 플랫폼에서 RBAC 기반의 사용자 접근제어 프레임워크)

  • Cho, Eun-Ae;Moon, Chang-Joo;Baik, Doo-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.405-422
    • /
    • 2007
  • Recently, according to the network environment, there are many researches for home network. Nowadays, in home network, the method that access control policy is managed for each home device by using ACL is popular, and EAM (Extranet access management) is applied as a solution. In addition, the research about secure OS is ongoing based on open operating system and the research of user authentication mechanisms for home network using home server is also in progress. However, these researches have some problems as follows; First, the transmission scope of expected access technology in home network is wide, so unauthenticated outside terminal can access the home network. Second, user is inconvenient because user need to set the necessary information for each device. Third, user privacy and convenience are not considered. OSGi provides a service platform for heterogeneous technologies in home network environment. Here, user access control is one of the core parts which should have no problems such as above items, but there are no concrete researches yet. Thus in this paper, we propose an access control policy management framework and access control operation based on RBAC for user access control in home network environment in which OSGi service platform is operated. First, we list the consideration which is not clearly mentioned in OSGi standard, and then we solve these above problems through new framework. In addition, we propose the effective and economical operation method which reduces the policy change frequency for user access control by using RBAC concept though limited resource of home gateway. Besides, in this paper, these proposed policies are defined separately as user-role assignment policy and permission-role assignment policy, and user decide their own policies. In conclusion, we provide the scheme to enhance the user convenience and to solve the privacy problem.

A Critical Review of the Meaning of 'Independence' in Policy Formulation: Redefining Independence and Dependence from the Perspective of the Elderly (노인독립 담론에 대한 비판적 성찰 : 독립과 의존의 재개념화)

  • Rhee, Ka-Oak;Woo, Kug-Hee;Choi, Sung-Jae
    • Korean Journal of Social Welfare
    • /
    • v.56 no.1
    • /
    • pp.5-22
    • /
    • 2004
  • The notion of independence is currently a focal point in public discourses in relation to the elderly. In most countries, the promotion of independence, not the alleviation of dependence, has been addressed as a priority goal in the formulation of social policies for the elderly and the term of independence is used in policy documents as if it were unproblematic. In most cases, policy documents do not offer a clear definition of independence, but generally the term is interpreted as self-sufficiency and health. Accordingly, in order to promote independence of the elderly, concrete strategies such as employment, social activities, participation, direct payments are being introduced in many advanced countries. This study critically reviews these discourses and strategies, and attempts at developing an understanding of how independence and dependence is constructed in contemporary social policies for the elderly. It is our critical point that we explores the meaning of the independence and dependence from the perspective of the elderly. Findings of this study are as follows: The elderly participated in this study tended to construct the meaning of 'independence' as privacy, self-esteem, autonomy and freedom. They also tended to perceive and interpret, from their perspective, the 'dependence' as a natural law and process, affection among human beings, reward and fruit of their lives, social justice and social responsibility. In this sense current policies for the elderly have not fully reflected the perspective of the elderly. Therefore, it is argued what is important in policy formulations for the elderly is to make efforts to reflect the perspective of the elderly on policy-makings for the elderly in terms of independence and dependence.

  • PDF

Emerging Internet Technology & Service toward Korean Government 3.0

  • Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.540-546
    • /
    • 2014
  • Recently a new government has announced an action plan known as the government 3.0, which aims to provide customized services for individual people, generate more jobs and support creative economy. Leading on from previous similar initiatives, the new scheme seeks to focus on open, share, communicate, and collaborate. In promoting Government 3.0, the crucial factor might be how to align the core services and policies of Government 3.0 with correspoding technologies. The paper describes the concepts and features of Government 3.0, identifies emerging Internet-based technologies and services toward the initiative, and finally provides improvement plans for Government 3.0. As a result, 10 issues to be brought together include: Smart Phone Applications and Service, Mobile Internet Computing and Application, Wireless and Sensor Network, Security & Privacy in Internet, Energy-efficient Computing & Smart Grid, Multimedia & Image Processing, Data Mining and Big Data, Software Engineering, Internet Business related Policy, and Management of Internet Application.

Authorization Model with Provisions and Obligations in XML

  • Kim Suhee;Park Jongjin
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.355-360
    • /
    • 2004
  • With the growing acceptance of XML technologies, XML will be the most common tool for all data manipulation and data transmission. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online and it is important for security to be integrated with XML solutions. Many policies require certain conditions to be satisfied and actions to be performed before or after a decision is made. Binary yes/no decision to an access request is not enough for many applications. These issues were addressed and formalized as provisions and obligations by Betti et Al. In this paper, we propose an authorization model with provisions and obligations in XML. We introduce a formal definition of authorization policy and the issues involving obligation discussed by Betti et Al. We use the formal model as a basis to develop an authorization model in XML. We develop DTDs in XML for main components such as authorization request, authorization policy and authorization decision. We plan to develop an authorization system using the model proposed.

  • PDF

A Study on the Factors Affecting Drone Use Intention -Comparative analysis of Korea and United Kingdom

  • Park, Seo Youn
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.6
    • /
    • pp.33-41
    • /
    • 2021
  • As interest in drones controlled by remote technology rapidly increases worldwide, drones are used in many fields such as military, rescue, and transportation as future innovations in many countries. In particular, as the drone has been spotlighted as a new future strategic industry, it is also used for public purposes such as disaster relief and crime investigation. However, security concerns such as the penetration of major national facilities, collisions with aircraft, and the possibility of privacy infringement due to aerial photography are also being raised. Unlike the increased interest in drones, there have been few studies on drone use, drone safety, and public attitudes toward drone use. This paper analyzed the perceptions of drone attitudes, drone stability and policy support for drones for Korean and United Kingdom.

An Analysis of the Public Awareness on National Policy on Protection of Personal Information: using SERVQUAL (SERVQUAL 기법을 이용한 국가 개인정보보호 정책에 대한 국민 인식의 분석)

  • Lee, Kyung-bok;Yoon, Ki-chan;Shim, Mina;Lim, Jong-in;Park, Tae Hyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1037-1055
    • /
    • 2016
  • After the enactment of the Personal Information Protection Act, policies and activities for the personal information protection have been actively promoted. However the people are showing negative attitudes about personal information, as the ongoing personal data leakages. Therefore, authors tried to empirical analysis of the effectiveness of national policy on the protection of personal information, using SERVQUAL model, focused on the people's perception, in order to identify that how the people recognized current policy. Authors find that the public has perceived the effectiveness of the policy positively, but the level of their awareness is low. And we identify that the people are highly aware of the policy's effectiveness for Immediacy, Convenience and Responsibility, while they have the lowest effectiveness for Efficiency. The policy's improvement focused on the public's low expectations/perceptions and effectiveness awareness, is required in order to develop people-oriented national privacy policy that are satisfied by the people.