• Title/Summary/Keyword: Protection And Utilization

Search Result 401, Processing Time 0.028 seconds

Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users ("클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안)

  • Lee, Jung Koo;Min, Daihwan;Kwon, Hun Yeong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

Directions for Forest Functions Mapping in Korea (산림녹지기능도의 도입 방향)

  • 변무섭;최만봉;김계환
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.29 no.5
    • /
    • pp.101-114
    • /
    • 2001
  • This study analyzed and examined literature and legislation in Korean and other countries to examine the concept and sense of mapping of forest functions that would be used as basic information for efficient application and management of forest ecosystems. The mapping of forest functions in Germany has been utilized to field data for efficient work and management of the ecosystem, and evaluation of forest environmental ecology by the mapping of forest functions has been applied directly or indirectly in country management plans, conservation of nature and landscape management plans. Forest protection areas in Korea were analysed for creating a map of forest functions. As the results, forest functions could be sorted into five categories, such as conservation area of forest production, prevention of disasters, landscape and abiological natural resource, valuable biotope and ecosystem and civil recreation. The mapping method was applied to these 5 categories important conservation targets. It is considered that mapping of forest functions in Korea can be used for systematic forest works and efficient ecosystem utilization and management, as well as it use basic data for environmental and ecological comprehension and evaluation on forest and green tract of land on the level of country development and utilization.

  • PDF

Soil Column Experiment to Evaluate Removal of Nutrients in Stormwater Runoff by Soil of Riparian Protection Zone (토양칼럼을 이용한 초기우수 중 염양염류의 수변녹지 토양에서의 제거도 평가)

  • Yoon, Seok-Pyo;Choi, Ji-Yong
    • Journal of Korean Society on Water Environment
    • /
    • v.20 no.3
    • /
    • pp.231-235
    • /
    • 2004
  • To investigate removal effects of nutrients in stormwater runoff by soil of riparian protection zone, soil column experiment was conducted for 20 months. Artificial stormwater runoff containing phosphate and nitrate was applied on the surface of soil column twice a week, and phosphate and nitrate concentrations were measured from the leached water. Soil of riparian protection zone reduced the released amount of infiltrated water to the surrounding water. After infiltration of 1m depth of soil column, average removal rates of phosphate and nitrate were 97.7 % and 74.7 %, respectively. As main mechanisms of phosphate are adsorption to soil particle and utilization by plants, periodical replacement of soil and harvesting of plant at the end of growing season are required. For the removal of nutrients in stormwater runoff by the soil layer, soil of riparian protection zone has higher hydraulic conductivity to infiltrate stormwater. Sandy soil having hydraulic conductivity of about $1{\times}10^{-2}cm/s$ range might be appropriate for this purpose.

Analysis of Changes in Contents of Home Management Part in Home Economics Textbooks for Middle School (교육과정 시기에 따른 중학교 가정교과서 가정관리분야 단원의 내용 변천)

  • Lee Yon-Suk
    • Journal of Family Resource Management and Policy Review
    • /
    • v.10 no.2
    • /
    • pp.19-42
    • /
    • 2006
  • The purpose of this study is to analyze the changes in contents of home management part in the home economics textbooks fur middle school from the 1st to the 7th curriculum period. The contents in the all of home economics textbooks published in every curriculum period are analyzed. The major findings of this study are as follows: 1. The part of home management is divided into seven specific areas including 'definition and process of home management', 'utilization of family resource and environment management', 'time management', 'household labor/work nanagement', 'family financial management', 'purchasing', and 'consumer protection'. 2. From the 6th curriculum period, the area of 'definition and process of home management' begun to be explained using system's approach and the area of 'household labor/work management' changed its' focus from household to self management. 3. The areas emphasized in the beginning of curriculum period were 'family financial management' and 'household labor/work management'. The 'consumer protection' ' and 'utilization of family resource and environment management' were the areas emphasized in the later curriculum period. 4. The contents of 'family financial management' area have changed very little, however, the contents of 'purchasing' area have changed a lot during the all curriculum periods. 5. The contents of illustrations, tables, pictures, and activities have changed according to changes of the contents of the textbooks.

  • PDF

A Study on the Utilization Schemes of E-Commerce for the Consumer Protecion (소비자보호를 통한 전자상거래 활성화 방안 연구)

  • Park, Chu-Hwan;Lee, Yong-Pil
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.39-56
    • /
    • 2004
  • This study introduces consumer protection policies at domestic and overseas, regarding the current situation that is raised about, and analyzes how to promote e-commerce with consumer protection oriented. This article explores e-commerce protection policies aiming at enforcing consumer protection and introduces some strategies - enhancing consumer trust, improving electronic transaction disputation, personal information security and privacy and using authorized certificate. This paper aims at suggesting the method of promoting e-commerce through ensuring the consumer trust and decreasing the transaction cost.

  • PDF

On Finding the Multicast Protection Tree Considering SRLG in WDM Optical Networks

  • Li, Yonggang;Jin, Yaohui;Li, Lemin;Li, Longjiang
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.517-520
    • /
    • 2006
  • In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm -multicast with SRLG sharing (MSS)- to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability.

  • PDF

The effective recloser and sectionalizer coordination and protection scheme when distributed resource is added in distribution system interconnected distributed resource (분산형 전원이 연계된 배전계통에 분산형 전원 추가 시 리크로저와 섹셔널아이저의 보호 협조 방안)

  • Jung, Hyun-Jun;Choi, Joon-Ho;Nam, Hae-Kon;Park, Sung-Jun;Park, Jang-Hyun;Ro, Kyoung-Soo
    • Proceedings of the KIPE Conference
    • /
    • 2005.07a
    • /
    • pp.704-706
    • /
    • 2005
  • According to the second scheme of the Korean Government about technology development, utilization and popularization of new ${\cdot}$ renewable energy, the continuous growth of distributed resources are expected. But there is a few paper about recloser and sectionalizer coordination and protection scheme in distribution system interconnected a number of distributed resources. In this paper, it is dealt with that recloser and sectionalizer coordination at the cases concerned with position among protection devices. Adding distributed resource, the problems of each case are investigated through simulation.

  • PDF

Energy-efficient Multicast Algorithm for Survivable WDM Networks

  • Pu, Xiaojuan;Kim, Young-Chon
    • Current Optics and Photonics
    • /
    • v.1 no.4
    • /
    • pp.315-324
    • /
    • 2017
  • In recent years, multicast services such as high-definition television (HDTV), video conferencing, interactive distance learning, and distributed games have increased exponentially, and wavelength-division multiplexing (WDM) networks are considered to be a promising technology due to their support for multicast applications. Multicast survivability in WDM networks has been the focus of extensive attention since a single-link failure in an optical network may result in a massive loss of data. But the improvement of network survivability increases energy consumption due to more resource allocation for protection. In this paper, an energy-efficient multicast algorithm (EEMA) is proposed to reduce energy consumption in WDM networks. Two cost functions are defined based on the link state to determine both working and protection paths for a multicast request in WDM networks. To increase the number of sleeping links, the link cost function of the working path aims to integrate new working path into the links with more working paths. Sleeping links indicate the links in sleep mode, which do not have any working path. To increase bandwidth utilization by sharing spare capacity, the cost function of the protection path is defined to use sleeping fibers for establishing new protection paths. Finally, the performance of the proposed algorithm is evaluated in terms of energy consumption, and also the blocking probability is evaluated under various traffic environments through OPNET. Simulation results show that our algorithm reduces energy consumption while maintaining the quality of service.