• Title/Summary/Keyword: Private Information Protection

Search Result 257, Processing Time 0.024 seconds

The Development of the Korean Lung Cancer Registry (KALC-R)

  • Kim, Young-Chul;Won, Young-Joo
    • Tuberculosis and Respiratory Diseases
    • /
    • v.82 no.2
    • /
    • pp.91-93
    • /
    • 2019
  • Lung cancer is the most commonly diagnosed cancer and the leading cause of cancer-related deaths worldwide. Globally, there were an estimated 1.8 million new cases and 1.59 million deaths in 2012. In Korea, the incidence of lung cancer is increasing and 24,267 (47.6/100,000) patients with lung cancer were registered at the Korea Central Cancer Registry in 2015. Previous nationwide surveys of lung cancer were performed in 1998 by the Korean Academy of Tuberculosis and Respiratory Diseases and in 2007 by the Korean Association for Lung Cancer (KALC), but the studies faced difficulties in maintaining lung cancer registry because of limitations regarding the Private Information Protection Act. To produce unbiased and reliable epidemiological data, the KALC and Korean Central Cancer Registry developed a detailed lung cancer registry (KALC-R) data structure. Following a pilot survey of 489 lung cancer cases in 2013, about 10% of the sampled lung cancer cases from the Korean Central Cancer Registry are surveyed each year. With the analysis of detailed data from the KALC-R, an important epidemiological background for scientific research or policy development is expected to be generated.

Family Ownership and Dividend Policy: Evidence from India

  • RAJVERMA, Abhinav;MISRA, Arun Kumar;KUMAR, Gaurav
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.61-73
    • /
    • 2022
  • The article examines the ownership structure and dividend payout behavior of India-listed firms using a panel regression approach. It focuses on family ownership and examines why dividend payouts of family firms differ from non-family firms. The study finds that family firms dominate and have concentrated ownership using data from the NSE-listed regular dividend-paying firms. Although family ownership concentration is high among Indian firms, these firms are not concerned about distributing cash as dividends. Instead, these firms focus on retaining and passing on control from one generation to the next. The evidence shows that family firms pay low dividends and have higher leverage than non-family counterparts. The results support the entrenchment of minority shareholders and the proposition that a high payout signals a reduction in the information asymmetry and level of risk. The study further illustrates that cash dividends tend to reduce the level of risk perceived; however, (cash dividend) leads to the deterioration firm's liquidity and aid in the shrinking of cash among emerging market firms. The originality of the paper lies in factoring ownership concentration while explaining the dividend behaviour from an emerging markets perspective, characterized by high private benefits and weak protection for external minority shareholders.

The Legal Issues of Private Investigation Service in WTO/FTA System : Study of South Korea (WTO/ FTA 체제에서 민간조사업의 법적문제)

  • Ko, Ji-Hoon;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.161-195
    • /
    • 2011
  • As crimes have increased to an extent that the police cannot cope with, there have been continuous discussions for the introduction of Private Investigation (hereafter PI) in Korea. However, attempts to legislate for the introduction of PI have failed every time PI bills for the introduction of PI were proposed. This was fundamentally because arguments both for and against the introduction of PI were sharply divided depending on the priorities. However, regardless of those clash of views, an apparent need for the legislation of PI service has arisen. As Korea opens its service market to other countries through GATS and FTAs, currently existing domestic PI law has been found to be inconsistent with international agreements such as GATS and KOREA-US(KORUS) FTA. This paper found that the Act on Usage and Protection of Credit Information which regulates PI service is inconsistent with the Article 12.4(a)(i) and (iii) of KORUS FTA and the Article 7.11 and the Article 7.13 of KOREA-EU FTA. If Korea does not modify the existing laws and establish new laws in relation to PI, such inconsistencies could lead to international trade disputes which could amount to billions of dollars. In this regard, the passage of the PI bill is necessary.

  • PDF

A Study on Synthetic Data Generation Based Safe Differentially Private GAN (차분 프라이버시를 만족하는 안전한 GAN 기반 재현 데이터 생성 기술 연구)

  • Kang, Junyoung;Jeong, Sooyong;Hong, Dowon;Seo, Changho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.945-956
    • /
    • 2020
  • The publication of data is essential in order to receive high quality services from many applications. However, if the original data is published as it is, there is a risk that sensitive information (political tendency, disease, ets.) may reveal. Therefore, many research have been proposed, not the original data but the synthetic data generating and publishing to privacy preserve. but, there is a risk of privacy leakage still even if simply generate and publish the synthetic data by various attacks (linkage attack, inference attack, etc.). In this paper, we propose a synthetic data generation algorithm in which privacy preserved by applying differential privacy the latest privacy protection technique to GAN, which is drawing attention as a synthetic data generative model in order to prevent the leakage of such sensitive information. The generative model used CGAN for efficient learning of labeled data, and applied Rényi differential privacy, which is relaxation of differential privacy, considering the utility aspects of the data. And validation of the utility of the generated data is conducted and compared through various classifiers.

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

DEVELOPMENT OF A VALLEY MANAGEMENT SYSTEM FOR GIS AND REMOTE SENSING EDUCATION

  • Wu, Mu-Lin;Wong, Deng-Ching;Wang, Yu-Ming
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.570-573
    • /
    • 2006
  • College GIS and remote sensing education usually consists of commercial software packages implementations in the classroom. Computer programming is quite important when college graduates work in private or public sectors relevant with GIS and remote sensing implementations. The objective of this paper was to develop a valley management system which implements GIS and remote sensing as the key components for education. The Valley Authority is entitled with water resource protection for sustainable drinking water supply of the second largest city in Taiwan. The test area consists of three different government agencies, Forest Service, EPA, and Water Resource Agency. Materials were provided by the Valley Authority in ArcGIS file format. MapObjects have made the GIS development process much easier. Remote sensing with image manipulation functions were provided by computer programming with Visual Baisc.NET and Visual C#.NET. Attributes inquiry are performed by these two computer languages as well. ArcGIS and ArcPad are also used for simple GIS manipulations of the test area. Comparison between DIY and commercial GIS can be made by college students. Functions provided by the developed valley management system depending on how many map layers have been used and what types of MapObjects components have been used. Computer programming experience is not essential but can be helpful for a college student. The whole process is a step-by-step sequence which college students can modify to depict their capability in GIS and remote sensing. The development process has gone through one semester, three hours every week in 18 weeks. College students enrolled in this class entitled with GIS showed remarkable progresses both in GIS and remote sensing.

  • PDF

De-identification Policy Comparison and Activation Plan for Big Data Industry (비식별화 정책 비교 및 빅데이터 산업 활성화 방안)

  • Lee, So-Jin;Jin, Chae-Eun;Jeon, Min-Ji;Lee, Jo-Eun;Kim, Su-Jeong;Lee, Sang-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.71-76
    • /
    • 2016
  • In this study, de-identification policies of the US, the UK, Japan, China and Korea are compared to suggest a future direction of de-identification regulations and a method for vitalizing the big data industry. Efficiently using the de-identification technology and the standard of adequacy evaluation contributes to using personal information for the industry to develop services and technology while not violating the right of private lives and avoiding the restrictions specified in the Personal Information Protection Act. As a counteraction, the re-identification issue may occur, for re-identifying each person as a de-identified data collection. From the perspective of business, it is necessary to mitigate schemes for discarding some regulations and using big data, and also necessary to strengthen security and refine regulations from the perspective of information security.

Identifying Social Relationships using Text Analysis for Social Chatbots (소셜챗봇 구축에 필요한 관계성 추론을 위한 텍스트마이닝 방법)

  • Kim, Jeonghun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.85-110
    • /
    • 2018
  • A chatbot is an interactive assistant that utilizes many communication modes: voice, images, video, or text. It is an artificial intelligence-based application that responds to users' needs or solves problems during user-friendly conversation. However, the current version of the chatbot is focused on understanding and performing tasks requested by the user; its ability to generate personalized conversation suitable for relationship-building is limited. Recognizing the need to build a relationship and making suitable conversation is more important for social chatbots who require social skills similar to those of problem-solving chatbots like the intelligent personal assistant. The purpose of this study is to propose a text analysis method that evaluates relationships between chatbots and users based on content input by the user and adapted to the communication situation, enabling the chatbot to conduct suitable conversations. To evaluate the performance of this method, we examined learning and verified the results using actual SNS conversation records. The results of the analysis will aid in implementation of the social chatbot, as this method yields excellent results even when the private profile information of the user is excluded for privacy reasons.

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

Operation Status of Chinese Security Service Industry and Institutional Settlement Methods (중국 보안서비스산업의 운영실태 및 제도정착 방안)

  • Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.536-547
    • /
    • 2014
  • With the changing safety services and social order systems accompanied by the economic development and changing public security environment since the Chinese economic reform, the security service industry in China is growing daily and related problems are increasing. For the Chinese security service market to be activated, the monopoly of security services by the public security agencies must be removed. In addition, the research and development, expansion, and applications of safety and crime prevention technologies regarding the safety and protection of exhibition, sales, culture, sports, commerce activities, combinations of safety technologies and crime prevention processes, the provision of relevant technical operations, and the expansion of security service areas are required. Furthermore, the administration rights, property rights, and business management rights of security companies must be separated, the security headquarters must be integrated and coordinated for optimization of various resources solely by market needs, and their rights and affiliation relations must be clear. Besides, the competitiveness of security companies in the security service market must be enhanced by unifying the business management, and optimizing and sharing their resources. The security service ordinances of China that have been implemented now must be applied realistically, methods to activate the true market economy for security services must be researched, and various ordinances related to security services must be realigned in line with the characteristics of security services. Finally, for the mutual cooperation system between public and private security services, the public security agencies must acknowledge the importance of private security services and the status of security service providers in crime prevention and social order maintenance. They must establish partnership relations with each other beyond the unilateral direction and management system for security services and drive with positive attitudes the security service industry which is still in its infancy.