• Title/Summary/Keyword: Privacy policy

Search Result 407, Processing Time 0.028 seconds

The Effects of GDPR on the Digital Economy: Evidence from the Literature (GDPR이 디지털 경제에 미치는 영향: 문헌 자료에 근거하여)

  • Prasad, Aryamala;Perez, Daniel R.
    • Informatization Policy
    • /
    • v.27 no.3
    • /
    • pp.3-18
    • /
    • 2020
  • In the growing digitalized world, the European Union implemented the General Data Protection Regulation(GDPR) to establish a comprehensive data protection framework across member states. Given the constitutional roots of GDPR, the EU's regulatory approach is different than other data protection regimes. The new regulation has strengthened individual rights to data protection, but it also introduced several obligations for businesses that collect and process personal data. We review the existing literature on privacy, particularly GDPR, from a policy perspective. The evidence outlines data regulation's effects on competition, innovation, marketing activities, and cross-border data flows. The discussion highlights the tradeoffs between increased regulation of data protection and its effects on the market.

Design of User Privacy Model for Strong Reliability in SNS Environment (SNS 환경에서 신뢰성이 강한 사용자 프라이버시 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.237-242
    • /
    • 2013
  • SNS is emerging as an academic and social interest, as Facebook and Twitter are developed explosively. But, SNS has a problem of exposing user's privacy because it is originated by exchanging user's personal information and opinion. This paper proposes SNS user privacy protecting model using data separation and false data information instead of blocking which is using to protect user's personal privacy. The proposed model do not let the third party extract precise information after collecting user's context information by adding false information to separated context information. Also, it gets user's agreement beforehand if SNS service provider uses user's information not to be used illegally by the third party.

E-DRM-based Privacy Protection Technology for Overcoming Technical Limitations of DLP-based Solutions (DLP방식의 문제점 극복을 위한 E-DRM 방식의 개인정보 보호 기술)

  • Choi, Jong-Uk;Lee, Yong-Jin;Park, Ju-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1103-1113
    • /
    • 2012
  • DLP technology has been effectively enforcing privacy protection policy in on-line computing environment. However, with wide spread use of smart devices and promotion of smart-works, it has been pointed out that DLP technology cannot effectively prevent privacy leakage at smart devices and is comparatively weak at APT attack. In this paper, we suggests a hybrid approach, PPS, which integrates E-DRM system with DLP technology, taking advantages of both technologies. The technology basically uses encryption function and access control of E-DRM system, and thus it can effectively prevent leakage of privacy information of customers, even if the documents are in the hands of malicious third parties.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

A Study on the Improvement of Youth Housing Support Policy

  • KIM, Sun-Ju
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.11
    • /
    • pp.29-38
    • /
    • 2020
  • Purpose: The problem of housing poverty among young people is a very important problem for the nation. Therefore, the main purpose of this paper is to identify the problems of the government's housing support policy for young people. And it is in presenting specific solutions by fully reflecting the opinions of experts. Research design, data and methodology: This study consisted of analyzing the following three research topics: 1) the differences of youth residential support housing policy impact on young adults' housing stability, 2) the problems and solutions of youth housing support policy, and 3) the differences of experts' opinions on the impact of government policy on youth housing stability. The subject of this study is the government's seven housing policies for young people. The targets include Happy Public Rental Housing (Happiness Housing), Station Area Rental Housing for youth (Station Area 2030), Public Dormitory for College Students (Public Dormitory & Hope Dormitory), Jeonse Rental Housing for College Students (Subject Lease Rental Housing for College Students), Social Housing for Young People, and Share House. The data was organized through expert surveys from 1st to 30th June 2020. The experts surveyed include professors & researchers, public officer & public institutions staff, and private developers of young adults' housing. The methodology of analysis on the problem and the solution of government policy was Frequency analysis. And analysis methods on differences of experts' opinion were ANOVA, Levene' test, and Schefe test. Results: Problems in Government's youth residential support housing policy include high rents, lack of supply, difficulty in acquiring rental housing, inconvenience in using shared spaces, conflicts with cohabitants, and invasion of privacy. Solutions include expanding supply to urban areas, establishing long-term plans, securing privacy, diversifying business methods, establishing platforms for rental housing transactions, and expanding various public support (financial support, etc). Conclusions: There was a difference in perception among groups of experts on the impact of public rental housing (called 'happiness housing') in youth housing stability. It is very urgent to come up with the most reasonable policy to support youth housing. This requires in-depth discussions by experts to narrow their differences.

A Study on Policy Acceptance Intention to Use Artificial Intelligence-Based Public Services: Focusing on the Influence of Individual Perception & Digital Literacy Level (인공지능 기반 공공서비스 정책수용 의도에 관한 연구: 개인의 인식과 디지털 리터러시 수준이 미치는 영향을 중심으로)

  • Jang, Changki;Sung, WookJoon
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.60-83
    • /
    • 2022
  • The purpose of this study is to empirically analyze the effect of individual perception of artificial intelligence and the level of digital literacy on the acceptance of artificial intelligence-based public services. For empirical analysis, a research model was set up based on the technology acceptance model and planned behavior theory using survey data of 2017 and analyzed through structural equations. To summarize the results of the analysis, firstly, the positive perception of individuals about artificial intelligence technology plays a role in reinforcing attitudes toward benefits and reducing concerns about public service in which artificial intelligence technology has been introduced. Secondly, the level of digital literacy reinforces both benefits and concerns about artificial intelligence technology, but it was found that the intention to use public services was reinforced through the benefits of artificial intelligence technology perceived by individuals, rather than privacy concerns about artificial intelligence technology. Thirdly, it was confirmed that the perceived benefits of individuals on artificial intelligence technology reinforced the intention to use public civil services, and privacy concerns negatively influenced the intention to use. It was confirmed that the influence of a perceived ease of use and usefulness, as opposed to privacy concerns, further reinforces the intention to use. Both citizens' positive perceptions regarding the accuracy and reliability of information provided through artificial intelligence technology and institutional complementation of responsibility for errors caused by artificial intelligence technology are strengthened, and technical problems related to privacy protection are solved.

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

Study on Improvement for Information System Installation for e-Government's Internal Control through Legal Review : Focused on Barum e-System (전자정부의 내부통제를 위한 정보시스템 도입에 있어서 제도적 개선방안에 관한 연구 : 바름 e 시스템을 중심으로)

  • Lee, Dong Han;Lee, Ook
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.179-193
    • /
    • 2013
  • E-Government refers to government to use ICT (information and communications technology) to work more effectively, share information and deliver better services to the public. With ICT, e-Government has increased transparency of governments. However even there has been much trial for transparency, corruption has been growing with the form of e-corruption. While external threats such as hackers and viruses can have serious consequences, currently most crime involving emerging technology is carried out by insiders i.e. employees in the e-government. Among the many tools being developed to fight e-corruption, there has been much focus lately on internal control system. So, South Korea developed and test-operated "Barum e-system" for internal control last year. This research establishes legal basis, information system link and privacy policy for settlement of this information system through legal review.

Implementation of the U.S. Aviation Security Policy and Privacy Protection Problem (미국의 항공보안정책 적용과 프라이버시 문제점)

  • Kang, J.Y.;Kim, C.H.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.3
    • /
    • pp.110-116
    • /
    • 2005
  • TSA needs to be more transparent with the new passenger screening system and its functioning to build the citizen trust. The system is needed to be not only effective but supported by Congress and the general public. Until this occurs, skepticism will underlie any discussion about its effectiveness in balancing the protection from terrorism with respect to individual liberties. CAPPS II can be a viable system if it is developed appropriately. The objectives of the study are to introduce the security program in the U.S. aviation security policy and to discuss privacy problems when it applies. Korea also needs to study a harmonious plan with the basis of global approach mind in the case of considering the transferring of passenger information from other states for the purpose of security.

  • PDF

Analysis of Anti-SPAM Regulations in Korean IT Law (정보통신망법 스팸 규제 개선 방안 연구)

  • Kim, Seongjun;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2011
  • Spam refers to any unwanted or unauthorized commercial messages. Spam may violate individuals' privacy or other personal rights. Spam often overloads network traffic, wastes individuals' time, lowers productivity and quality of life, and limits the trustworthiness of Internet businesses. As the use of mobile messaging services and social networking services both on mobile communication networks and on the Internet increase, newer and more complex types of IT applications and services are often used as new means of spam. In this research, the characteristics and impact of new and future forms of spam, and anti-spam related policies and regulations are surveyed. To improve the effectiveness of anti-spam policies and regulations in Korea, adding a definition of spam in the law, changing policies to focus on the 'type of services' rather on the medium of transmission, and redefining the scope of 'commercial purposes' in Korean law are suggested.