• Title/Summary/Keyword: data protection law

Search Result 183, Processing Time 0.024 seconds

A Study on the Safe Use of Data in the Digital Healthcare Industry Based on the Data 3 Act (데이터 3법 기반 디지털 헬스케어 산업에서 안전한 데이터 활용에 관한 연구)

  • Choi, Sun-Mi;Kim, Kyoung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.25-37
    • /
    • 2022
  • The government and private companies are endeavoring to help the digital healthcare industry grow. This includes easing regulations on the big data industry such as the amendment of the Data 3 Act. Despite these efforts, however, there have been constant demands for the amendment of laws related to the medical field and for securing medical data transmissions. In this paper, the Data 3 Act of Korea and the legal system related to healthcare are examined. Then the legal, institutional, and technical aspects of the strategies are compared to understand the issues and implications. Based on this, a legal and institutional strategy suitable for the digital healthcare industry in Korea is suggested. Additionally, a direction to improve social perception along with technical measures such as safe de-identification processing and data transmission are also proposed. This study hopes to contribute to the spread of various convergent industries along with the digital healthcare industry.

A Case Study: Unsupervised Approach for Tourist Profile Analysis by K-means Clustering in Turkey

  • Yildirim, Mustafa Eren;Kaya, Murat;FurkanInce, Ibrahim
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Data mining is the task of accessing useful information from a large capacity of data. It can also be referred to as searching for correlations that can provide clues about the future in large data warehouses by using computer algorithms. It has been used in the tourism field for marketing, analysis, and business improvement purposes. This study aims to analyze the tourist profile in Turkey through data mining methods. The reason relies behind the selection of Turkey is the fact that Turkey welcomes millions of tourist every year which can be a role model for other touristic countries. In this study, an anonymous and large-scale data set was used under the law on the protection of personal data. The dataset was taken from a leading tourism company that is still active in Turkey. By using the k-means clustering algorithm on this data, key parameters of profiles were obtained and people were clustered into groups according to their characteristics. According to the outcomes, distinguishing characteristics are gathered under three main titles. These are the age of the tourists, the frequency of their vacations and the period between the reservation and the vacation itself. The results obtained show that the frequency of tourist vacations, the time between bookings and vacations, and age are the most important and characteristic parameters for a tourist's profile. Finally, planning future investments, events and campaign packages can make tourism companies more competitive and improve quality of service. For both businesses and tourists, it is advantageous to prepare individual events and offers for the three major groups of tourists.

An Approach to Structuralizing Business Information for Internet Shopping Malls (인터넷쇼핑몰의 사업자신원정보 구조화 방안)

  • 장용식
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.27-45
    • /
    • 2004
  • While on-line shopping is increasing, the "Consumer Protection Law in Electronic Commerce" obliges each internet shopping mall to provide its business information. Although most internet shopping malls provide their business information in the semi-structured format on the bottom of their homepages, the attributes and expression forms of business information are different each other. It makes consumers difficult to identify their business information and lowers public confidence. Hence this study proposes three approaches - HTML-based structure, XML-based structure, and XML data island-based structure - to structuralizing business information for correct expression. The experiment results showed that the business information extraction time by XML data island-based structure is independent of the size of the web document, while the time by HTML-based structure is dependent on the size. By comparing the business information extraction times, we show that XML data island-based structure is more efficient and effective than HTML-based structure.structure.

  • PDF

A Study on Recoverability of Opportunity Profits Loss upon Time-Delay in Construction Contract (건설공사의 공기지연과 기회이익의 손실보전에 관한 연구)

  • Chun Jae-Youl;Lee Kyung-Kook
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.359-364
    • /
    • 2003
  • The loss of potential opportunity profit which is consisting in the partial markups of the corporation would taking placed in related with the time-delay deeply, has customarily disregarded in contract adjustment under the principles of denial of cost accounting method, declined conjecture in the point of benefits and protection of the law in scope of compensation and the restricted conditions of constant contract. It is being resulted from that the policies of the general principles of accounting standards which is subjected to ask an objective data and evidence, and the denial system as a debt derived from imperfect legal theory applied by current law. Therefore, it is necessitated to find if any irrationality in the positive system is and further to draw an improved reasonable measures to adopt by review of constant system preparing tile reasonableness with the method of suitable quantification devices provided that any time-delay is induced by the party.

  • PDF

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.

Aviation Safety Regulation and ICAO's Response to Emerging Issues (항공안전규제와 새로운 이슈에 대한 ICAO의 대응)

  • Shin, Dong-Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.207-244
    • /
    • 2015
  • Aviation safety is the stage in which the risk of harm to persons or of property damage is reduced to, and maintained at or below, an acceptable level through a continuing process of hazard identification and risk management. Many accidents and incidents have been taking place since 2014, while there had been relatively safer skies before 2014. International civil aviation community has been exerting great efforts to deal with these emerging issues, thus enhancing and ensuring safety throughout the world over the years. The Preamble of the Chicago Convention emphasizes safety and order of international air transport, and so many Articles in the Convention are related to the safety. Furthermore, most of the Annexes to the Convention are International Standards and Recommended Practices pertaining to the safety. In particular, Annex 19, which was promulgated in Nov. 2013, dealing with safety management system. ICAO, as law-making body, has Air Navigation Commission, Council, Assembly to deliberate and make decisions regarding safety issues. It is also implementing USOAP and USAP to supervise safety functions of member States. After MH 370 disappeared in 2014, ICAO is developing Global Tracking System whereby there should be no loophole in tracking the location of aircraft anywhere in world with the information provided by many stakeholders concerned. MH 17 accident drove ICAO to install web-based repository where information relating to the operation in conflict zones is provided and shared. In addition, ICAO has been initiating various solutions to emerging issues such as ebola outbreak and operation under extreme meteorological conditions. Considering the necessity of protection and sharing of safety data and information to enhance safety level, ICAO is now suggesting enhanced provisions to do so, and getting feedback from member States. It has been observed that ICAO has been approaching issues towards problem-solving from four different dimensions. First regarding time, it analyses past experiences and best practices, and make solutions in short, mid and long terms. Second, from space perspective, ICAO covers States, region and the world as a whole. Third, regarding stakeholders it consults with and hear from as many entities as it could, including airlines, airports, community, consumers, manufacturers, air traffic control centers, air navigation service providers, industry and insurers. Last not but least, in terms of regulatory changes, it identifies best practices, guidance materials and provisions which could become standards and recommended practices.

An exploration of the relationship between crime/victim characteristics and the victim's criminal damages: Variable selection based on random forest algorithm (범죄 및 피해자 특성과 범죄피해 내용의 관계 탐색: 랜덤포레스트 알고리즘에 기초한 변인선택)

  • Han, Yuhwa;Lee, Wooyeol
    • Korean Journal of Forensic Psychology
    • /
    • v.13 no.2
    • /
    • pp.121-145
    • /
    • 2022
  • The current study applied the random forest algorithm to Korean crime victim survey data collected biennially between 2010 and 2018 to explore the relationship between crime/victim characteristics and the victim's criminal damages. A total of 3,080 cases including gender, age (life cycle stage), type of crime, perpetrator acquisition, repeated victimization, psychological damage (depression, isolation, extreme fear, somatic symptoms, interpersonal problems, moving out to avoid people, suicidal impulses, suicide attempts), and emotional changes after victimization (changes in self-protection confidence, self-esteem, confidence in others, confidence in legal institutions, and respect for Korean legal system/law) were analyzed. Considering the features of data that are difficult to apply traditional statistical techniques, this study implemented random forest algorithms to predict crime and victim characteristics using the victim's criminal damages (psychological damage and emotional change) and selected good predictors using VSURF function in VSURF package for R. As a result of the analysis, it was confirmed that the relationship between the type of crime and depression, extreme fear, somatic symptoms, and interpersonal problems, between perpetrator acquisition and somatic symptoms and interpersonal problems, and between repeated victimization and changes in respect for Korean legal system/law. Gender and life cycle stage (youth/adult/elderly) were found to be related to extreme fear and changes in self-protection confidence, respectively. However, more empirical evidence should be aggregated to explain the results as meaningful. The results of this study suggest that it is necessary to enhance the experts' knowledge and educate them on cases about the relationship between crime/victim characteristics and criminal damage. Strengthening their interview strategy and knowledge about law/rules were also needed to increase the effectiveness of the Korean victim assessment system.

Privilege and Immunity of Information and Data from Aviation Safety Program in Unites States (미국 항공안전데이터 프로그램의 비공개 특권과 제재 면제에 관한 연구)

  • Moon, Joon-Jo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.23 no.2
    • /
    • pp.137-172
    • /
    • 2008
  • The earliest safety data programs, the FDR and CVR, were electronic reporting systems that generate data "automatically." The FDR program, originally instituted in 1958, had no publicly available restrictions for protections against sanctions by the FAA or an airline, although there are agreements and union contracts forbidding the use of FDR data for FAA enforcement actions. This FDR program still has the least formalized protections. With the advent of the CVR program in 1966, the precursor to the current FAR 91.25 was already in place, having been promulgated in 1964. It stated that the FAA would not use CVR data for enforcement actions. In 1982, Congress began restricting the disclosure of the CVR tape and transcripts. Congress added further clarification of the availability of discovery in civil litigation in 1994. Thus, the CVR data have more definitive protections in place than do FDR data. The ASRS was the first non-automatic reporting system; and built into its original design in 1975 was a promise of limited protection from enforcement sanctions. That promise was further codified in an FAR in 1979. As with the CVR, from its inception, the ASRS had some protections built in for the person who might have had a safety problem. However, the program did not (and to this day does not) explicitly deal with issues of use by airlines, litigants, or the public media, although it appears that airlines will either take a non-punitive stance if an ASRS report is filed, or the airline may ignore the fact that it has been filed at all. The FAA worked with several U.S. airlines in the early 1990s on developing ASAP programs, and the FAA issued an Advisory Circular about the program in 1997. From its inception, the ASAP program contained some FAA enforcement protections and company discipline protections, although some protection against litigation disclosure and public disclosure was not added until 2003, when FAA Order 8000.82 was promulgated, placing the program under the protections of FAR 193, which had been added in 2001. The FOQA program, when it was first instituted through a demonstration program in 1995, did not contain protections against sanctions. Now, however, the FAA cannot take enforcement action based on FOQA safety data, and an airline is limited to "corrective action" under the program. Union contracts can exclude FOQA from the realm of disciplinary action, although airline practice may be for airlines to require retraining if there is no contract in place forbidding it. The data is protected against disclosure for litigation and public media purposes by FAA Order 8000.81, issued in 2003, which placed FOQA under the protections of FAR 193. The figure on the next page shows when each program began, and when each statute, regulation, or order became effective for that program.

  • PDF

A Linkage Analysis of ISMS-P and GDPR; Focused on Personal Information Protection (ISMS-P와 GDPR의 개인정보보호 부문 연계 분석)

  • Park, Minjung;Yu, Jieun;Chai, Sangmi
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.55-73
    • /
    • 2019
  • The importance of the personal information has been increased, there have been a lot of efforts to establish a new policy, certification or law for administrating personal information more effectively and safely. Korean government has operated ISMS and PIMS certification system to assess whether an organization has established and managed appropriate information security system or not. However, it has been addressed the needs for revising and modifying of PIMS and ISMS. It is evaluated there are a few overlapped criteria to assess information management system in both ISMS and PIMS. ISMS-P certification, combining with ISMS and PIMS, is, finally, suggested, in the recent. GDPR is established having an aim of primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. This study compares GDPR and ISMS-P, focusing on "personal information". It can be expected to contribute as followings. This study can be a criterion for self-evaluation of possibility to violate of GDPR of a firm in preparation for ISMS-P. Second, this study also aims to increase the understanding of the role of ISMS-P and GDPR, among various certifications with the purpose of assessment of the information security management system, by reducing the costs required to obtain the unnecessary certification and alleviating the burden. Third, it contributes to diffusion of ISMS-P newly implemented in Korea.