• Title/Summary/Keyword: Transfer of Personal Data

Search Result 99, Processing Time 0.028 seconds

A Research on the Transference of Trust from Service Provider to MyData Banking Service (서비스 제공 기업에 대한 신뢰가 금융 마이데이터 서비스에 전이되는 현상에 관한 연구)

  • Ah Ro Kum;Jung Hoon Lee;Yun A Yeo
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.97-121
    • /
    • 2024
  • As data usage grows in importance, ensuring individual control over personal information becomes critical. The emergence of the 'MyData' concept addresses this, particularly in financial services. Although the institutional and technological framework for financial MyData services is in place, there's a need to establish consumer understanding and perception of its usefulness and safety for successful activation. This study focuses on investigating the impact of trust on the intention to use the new mobile banking service, financial MyData. This study has three objectives. Firstly, to analyze whether trust in financial MyData services and trust in financial MyData service providers affect the intention to use financial MyData services. Secondly, to analyze the process of forming trust in financial MyData services based on the phenomenon of transferring trust in service providers to trust in services. Thirdly, to identify the process by which trust transfer occurs between service providers and financial MyData services. Ultimately, the goal of this study is to promote the intention to use financial MyData services based on the concept of trust and to activate these services. In summary, this study emphasizes the significance of trust in financial MyData services, exploring its impact on user intention and the transfer of trust from providers to services. By promoting consumer trust, the research aims to contribute to the activation of financial MyData services.

A Study on the Application Method of 3-Dimensional Modeling Data (3차원 모델 링 데이터의 활용방법에 관한 연구)

  • 김현성;김낙권
    • Archives of design research
    • /
    • v.14
    • /
    • pp.109-119
    • /
    • 1996
  • One of the most important factors in the work environment of the industrial design is the design process which can systematically synthesize the informations of related fields. Because the computer technology is being radically developed, industrial should not only positively be able to cope with new technologies, but also should positively be able to take part in the development of the integrated system for the process by the new technologies. Recently in the industrial design field, designers are often using the computer~applied-3D modeling techniques in the development process of industrial design products, especially in the visualization level of the design development. In this paper, we studied the workstation modeling process to understand the computer~applied-3D modeling and presented the methods of transfer of the 3D-modeling data of a workstation(SGI) to the AutoCAD data of a personal computer which is generally being used as a drawing tool in mechanism parts. Through the development process of an electronic taxi meter as a practical case study, we check the possibility whether the 3D-modeling data transferred from an industrial design part to a mechanism part can directly be used as the mechanism data. For this, we transferred the 3D-modeling data of an electronic taxi meter created with a workstation(SGI) to the AutoCAD data of a personal computer and checked the usefulness of data transferred from an industrial design part to a mechanism part. Through these processes of data transfer, we aimed to find out the basic principles which can be rationally applied to a mechanism part or a production part.

  • PDF

A Proposal for Certificate Status Validation Using the Call Processing of PCS (PCS의 호처리를 이용한 인증서 상태검증 모델 제안)

  • Lee Young-Sook;Won Dong-Ho;Lee Young-Gyo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • With the rapid progress of research to offer a convenience of mobile communication, the mobile users can use not only the services of voice call but also the variety services of data communication using Internet. These include Internet Searching, Internet Shopping and Internet banking and Internet stock exchange and electronic payment and so on, based on PKI. Also, the need of data communication between the mobile users has been increased. As it is possible for mobile users to do user authentication, key distribution, encryption, decryption and so on, it is needed the certificate status validation between the mobile users. However due to the PCS(Personal Communication System) had been only designed and implemented for voice call between the mobile users, it is not easy to apply data communication between the mobile users on PKI. Therefore the study of for the data communication between the mobile users in PCS is a few. It is for the data transfer between the mobile users to communicate using call processing of PCS. So, we propose how to process the certificate status validation during call processing for data communication between the mobile users in the PCS.

  • PDF

The analysis of transfer effect through recruit education programs for security personnel (민간 시큐리티 종사자의 신임 교육에 따른 전이효과 분석)

  • Lee, Young-Seok;Bang, Whan-Bog;Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.243-264
    • /
    • 2008
  • Investigation about training of Private Security in Korea has managed status of training and understanding of issue mostly, systematic analysis about transfer effect as well as learning and determinant of training is insufficient. Consequently this investigation research to examine the effect of training program for newly appointed private security guards to learning and transfer then, to analyze factor through incumbent private security guard-oriented hypothesis testing under article 13, section 1 of the security guard law. To grasp effect factors of learning and transfer, this dissertation establishes research model and research hypothesis through domestic and foreign studies and then theoretical as well as positive literatures consideration in the first place. Conclusion of this investigation through techniques mentioned above and data analysis is as follows. First of all, the personal characteristics, training characteristics, work environment, difference of transfer as well as learning are verified in accordance with Sociodemographic characterist of Private Security Guard. After then, there is a difference of great import. Secondly, the effect of personal characteristics of Private Security Guard to the transfer is inspected. As a result, there is a difference of significance statistical. Thirdly, the effect of training characteristics of Private Security Guard to the transfer is inspected. Consequently, there is a difference of import statistical. The following thing, subsequent to inspection about the effect of work environment of Private Security Guard to transfer, statistical difference of import is.

  • PDF

Analyses of Framework for Enhanced RFID Security and Privacy (개선된 RFID 보안 및 비밀성을 위한 프레임워크의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.885-888
    • /
    • 2009
  • Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this paper we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy model a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her/his control, authenticated requests, release tags, transfer them to new owners, and so on. In this paper, we analyses a new type of simple a framework for enhancing RFID security by means of a proxy, a personal device that assumes control of a user's tags.

  • PDF

Implementation of a Remote Bio-Equipment System for Smart Healthy Housing Properties

  • Han, Seung-Hoon
    • KIEAE Journal
    • /
    • v.14 no.6
    • /
    • pp.23-29
    • /
    • 2014
  • It is essential to investigate the structure and the main characteristics of BSN (Bio-Sensor Network) platform in built smart healthcare environment while designing healthy housing facilities. For this study, WSN (Wireless Sensor Network) data transmission technologies have been employed with medical sensors, and optimal medical devices would provide various Web 2.0 services by connecting to the WiBro network. The BSN platform normally recognizes in surroundings of WBAN (Wireless Body Area Network) or WPAN (Wireless Personal Area Network), and it is possible to manage sensor nodes by utilizing SOAP (Simple Object Access Protocol) and REST (REpresentational State Transfer). In addition, the feature of SNMP (Simple Network Management Protocol) for mobile gateway is also included for being adapted to huge network structure. Finally, BSN platform will play a role as important clues for developing personal WSN service models for smart healthy housing properties.

Study for Guideline of CD copy Issue to Secure Personal Information (개인정보 보호를 위한 의료영상 복사발급 지침에 대한 고찰)

  • Lee, Jong-Woong;Kang, Ji-Yeon;Kim, Eun-Jeong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.11-16
    • /
    • 2008
  • Images of medical treatment on PACS environment are digitized and they make saving and transmission of patient's information easy with CD format causing increase of patients transfer rate between hospital and data transmission as well. Figuring out the configuration of confining status of copied images of medical treatment with CD format and present the appropriate way of identification for personal information. 20 general hospital over 500 beds which are utilizing PACS currently. Questionnaire investigation focusing on PACS operation center and it's management people. In accordance with the law of securing personal information of public organizations, it says "Anyone who wants to see his or her information via representative he or she needs to make a letter of attorney and turn in this to the president of it's possessing facility" in the article 16. Based on the investigation of general hospital for CD copy issue status near metropolitan area, 8 out of 20, were issuing CD copy through personal identification process(the person oneself and representative) and 10 general hospital were doing by getting signature of receiptor only without identification of the person oneself and 2 general hospital confirmation process is not at all. By the law of securing personal information of public organization, article 16, confirmation process is supposed to mandate lawfully with a letter of attorney when there is any request of reading and/or copies of one's information. But in reality, there were no consistent rules on reading, the process and coverage of copy issue, rejection coverage of copy issue of CD copy in each general hospital PACS operation center. Therefore there is a big need for consolidated format which is applicable by law when the representative requests to issue of CD copy that is storing medical treatment images. By issue through this consolidated format, securing medical information of individual and systemic operation and management will be valid and effective.

  • PDF

A Study on the Influence of Personal Characteristics of Youth Employment on the Preparation for Turnover: Focused on the adjustment effect of experience in failing to get jobs

  • KIM, Jong-Jin;UM, Kyung-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.7
    • /
    • pp.19-28
    • /
    • 2020
  • Purpose: In this study, we would like to confirm that the transfer of young workers may be a means of enhancing their internal satisfaction, not to get a better job, by setting work-related characteristics that are highly relevant to job-related factors. Research design, data, and methodology: In this study, preparation for turnover was set as dependent variables to identify factors related to the turnover of young people, and the type of business, employment type, debt status, job satisfaction, job difficulty compared to education level, job difficulty, job degree, job major agreement, debt status, and other demographic social characteristics were selected as independent variables. Results: The characteristics related to personal criteria in job-seeking process were significant in the form of business, employment type, job satisfaction, work difficulty compared to the level of education, work difficulty compared to the level of technology, job major matching, and debt status. Conclusions: This study confirmed that young people's turnover may not simply be a means to get a better job, but to increase satisfaction in the internal aspects of their jobs, and that for young people, a job is an important development process that represents their identity and needs to be approached from a life-cycle perspective.

A Study on UMPC's Role in u-Learning (U-러닝에서 UMPC의 역할에 대한 연구)

  • Yi, Mun-Ho;Kim, Mi-Ryang
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.127-139
    • /
    • 2008
  • The value of up-to-date Mobile PC such as UMPC (Ultra Mobile Personal Computer) is recognized greatly in learning environment that busywork such as characteristic of transfer easy and real time communication possibility etc. and conversation with a colleague student, free sending of studying data and public ownership etc. is required. Wish to recognize whether is acting relevant role in u - unfold learning that inflect UMPC in integration research model, and UMPC is u searching for relevant element at studying activity unfolding process u - integration Inquiry-Based Learning that present in Korean education & research information service (KERIS) at fifth-year student science time In primary school in this research. This research result could take charge role of UMPCs' studying-activity though there is persistent feedback with teacher among studying-activity although UMPC's role is utilized on constituent that can be related with studying-activity in learning process.

  • PDF

A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA (FTA 체결에 따른 금융정보 국외이전에 대한 정책적 대응방향 연구)

  • Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.117-130
    • /
    • 2011
  • In a situation where worldwide free trade between countries has expanded recently, our country is being rapidly pushed FTA agreements with the financial developed countries such as United States, EU. According to the agreement, the user information of foreign financial companies in Korea is expected to be transfered overseas. In this paper, we need to define the scope and the definition about the transfer of information and analyze the relating domestic and foreign laws preparing for Cross Border Financial Information Transfer. Also, we review the expected issues about the transfer of information divided into institutional and technical sectors and arc presented the policy implication such as differentiation of regulatory information, enactment and amendment of Personal Information Protection Law(Draft) and related regulations, ensuring the safety of financial companies, raise the standard guidelines of the transfer of information. We refers to the needs for policy formulation to differentiate our privacy information from financial information to protect the privacy of users. The proposed countermeasures in this paper is expected to be helpful the measures to prepare for other institutions such as banks and supervisory authorities prepare for the future Cross Border Financial Information Transfer according to PTA.