• Title/Summary/Keyword: Protection measures

Search Result 961, Processing Time 0.025 seconds

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory (소셜 네트워크 서비스(SNS) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Jung-Eun;Kim, Seong-Jun;Kwon, Do-Soon
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.1-30
    • /
    • 2016
  • Purpose The purpose of this study is to grasp the factors influencing domestic SNS users' privacy protection behavior and verify their relationship through self-efficacy and responsiveness. Thus, this study tries to suggest efficient and effective measures for SNS personal information protection. Design/methodology/approach To this end, with main variables of the protection motivation theory based on the assumption that when users are exposed to the threat to their health, they would have protection motivation and change their behavior of protecting their health, a research model was suggested. In addition, in order to empirically verify the research model, a survey was performed targeting general college students having the experience of using SNS. Findings As a result of the analysis, first, perceived effectiveness and self-efficacy had a positive effect on responsiveness. Second, perceived barrier had a positive effect on self-efficacy. Third, self-efficacy and responsiveness had a positive effect on privacy protection behavior. This study is expected to contribute to establishing an effective guideline for measures that could induce SNS users' privacy protection behavior.

A Research on Institution's Countermeasure for Personal Information Protection Act Based on the Examples of Performing the Privacy Impact Assessment (개인정보 영향평가 수행 사례에 기반한 기관의 개인정보보호법 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.89-98
    • /
    • 2012
  • According to the enforcement of Personal Information Protection Act as of September 2011, the laws and regulations for the protection of personal information that were applied only to the certain sectors such as information & communication network, financial institutions, public sector etc. for the time being has been expanded to apply to all public and private sectors to process personal information. In particular, because the public institutions are obliged to be mandatorily conducted of the Privacy Impact Assessment, it will be enforced in earnest for each agency's informationization business that handles personal information. In this paper, I examine the most derived vulnerability and set up the improvement measure to supplement it with the examples of 10 of all the institutions conducting the Privacy Impact Assessment in the year 2011. And, I suggest the measures to be prepared by the institutions to observe the Personal Information Protection Act.

The Relationship between Human Rights Protection Trade Norms and WTO Agreement-focused on Conflict and Harmonization and Development of Domestic Trade Norms (인권보호 무역규범과 WTO협정의 관계-충돌과 조화 그리고 국내무역규범의 발전방안을 중심으로)

  • Hyun-Chul Kim;Hag-Min Kim
    • Korea Trade Review
    • /
    • v.47 no.5
    • /
    • pp.201-221
    • /
    • 2022
  • This study aims to analyze a harmonious approach between trade norms for the protection of human rights and the WTO agreements is increasingly necessary and important. conflicts and harmonization that may occur between major human rights protection trade norms and WTO agreements were comprehensively reviewed. The hard legalization of corporate social responsibility for sustainable development, such as human rights protection, was in conflict with the WTO Agreement, which was based on the principle of non-discrimination. As the currently expanding human rights protection trade norms reflect differences in the positions of developed and developing countries, it was also pointed out that there may be disputes over WTO compatibility and distorted protectionism measures. Accordingly, the applicability of the general exceptions to Article 20 of the GATT were reviewed together, and Article 20(a) of GATT, "necessary to protect public morals" may differ between developed and developing countries, and thus limitations were also considered. At the same time, When it is necessary to take regulatory measures such as prohibition of imports from a specific country for human rights protection, it was reviewed and proposed domestic trade norms revision.

Privacy of Capability Token in the IoT Service System

  • Jang, Deresa;Kim, Jin-bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • The recent development of the Internet of things (IoT) has led to the introduction of new access control measures. Even during the access control for security, however, there might be privacy infringements due to unwanted information provision and collection. Measures to control this process are therefore required. This paper defines the structure and policies of tokens to protect privacy that can be exposed through the token information when you use the capability token in the IoT service system.

Construction of Lightning Protection System for Railway Signaling Equipments (철도신호설비용 낙뢰방호장치의 건설)

  • Choi Kyu-Hyoung;Seo Seok-Chul;Choi Se-Wan
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1193-1198
    • /
    • 2004
  • This paper describes the lightning protection system for railway signaling equipments installed at subway car depots in Seoul metropolitan Rapid Transit Cooperation. Several measures for improving lightning protection performance are adopted; newly organized grounding system for neutral line of power system, rolling method to minimize damages induced by direct lightning strike, new measures to reduce voltage differences between the signaling equipments and the ground, and improvement of grounding system. The proposed system has greatly reduced the grounding resistance and also the voltage difference between the signaling equipments and the ground, and has prevented the accident related with lightning surges since it was installed. The proposed approach can be viewed as a useful alternative of dealing with lightning protection for railway signaling equipments.

  • PDF

Protecting electronic equipment against lightning surge (정밀기기의 낙뢰서지 대책에 관한 연구)

  • 임순재;이주광;이완규;최만용
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.04b
    • /
    • pp.358-362
    • /
    • 1995
  • Precision electronic equipments are composed of sophisticated microcircuits that are extremely vulnerable to lightning-caused voltage spike. This transient voltage spike may cause upset, latent failure or interference on electronic equipments. In order to develop efficient lightning protection measures on AC power lines for a road traffic controller, experimental surge immunity tests were conducted according to IEC standard 801-5. The combination of gas tube arrester and metal-oxide varistor was installed at the input of AC power lines and the silicon avalanche suppressor installed at the output of DC power supply as lightning protection measures.

  • PDF

Flood Control Measures of the nakdong River Basins (낙동강유역 홍수방지대책 제언)

  • 구본충
    • Journal of the Korean Professional Engineers Association
    • /
    • v.35 no.4
    • /
    • pp.48-51
    • /
    • 2002
  • Due to locally torrential downpours which shows Increasing trend, high tide of the southern sea of Korea and etc. submerged and Inundated districts at the lowlands of Nakdong River Basins has been Increasing year by year In order to protect flood hit, it is necessary to make an early implementation of flood control dam and other flood protection works according to Nakdong River Comprehensive Development Project. In addition to the large scale comprehensive projects, local key measures, such as lowland development control, embankment reinforcement, leakage protection, maintenance and management of facilities, increase in pumping station, will be highly effective.

  • PDF

COVID -19: Protection of Workers at the Workplace in Singapore

  • Ng, Wee Tong
    • Safety and Health at Work
    • /
    • v.12 no.1
    • /
    • pp.133-135
    • /
    • 2021
  • The COVID-19 pandemic has resulted in movement restrictions being instituted globally and the cessation of work at many workplaces. However, during this period, essential services such as healthcare, law enforcement, and critical production and supply chain operations have been required to continue to function. In Singapore, measures were put in place to protect the workers from infection at the workplace, as well as to preserve the operational capability of the essential service in a COVID-19 pandemic environment. This paper critically analyses the measures that were implemented and discusses the extension to broader general industry.