• Title/Summary/Keyword: information Protection

Search Result 4,490, Processing Time 0.033 seconds

A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory (인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로)

  • Park, Chanouk;Lee, Sang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.59-71
    • /
    • 2014
  • This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law's effect on privacy awareness and behavioral change. The study finds that there exists a significant difference in privacy protection behavior according to privacy rights awareness. Independent variables are as follows: Five variables (Perceived vulnerability, Perceived severity, Perceived response effectiveness, Perceived barriers, Privacy Rights awareness) were tested as critical variables influencing Behavioral Intention in PMT model. Privacy awareness had a moderating effect on the relationship between perceived severity and privacy protection behavior. This study would contribute on theoretical expansion of Protection Motivation Theory and also provide practical implications for effective ways to promote behavioral changes.

Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness (기업의 정보보호 활동과 정보침해 사고 간의 관계: 정보보호 인식의 매개효과를 중심으로)

  • Moon, Kunwoong;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.897-912
    • /
    • 2017
  • This paper focuses on how the protection of information security incident is effective in via Information security awareness when conducting information security activities of enterprises. Research models have theorized that the information security activity and the information security awareness will reduce the incidence of information security. The general characteristics of analysis targets have been carried out in the frequency analysis, and the reliability of the measuring tool has been utilized to calculate the coefficient of Cronbach's information protection. Evidence has been demonstrated regarding the relationship between information security activities and information security awareness and information security incidents.

Comparative Analysis of Regulations for Consumer Protection of Local Self-government (지방소비자행정 발전을 위한 광역자치단체의 소비자보호조례와 소비자정책심의위원회 운영 현황 비교분석)

  • 송인숙;제미경
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.9
    • /
    • pp.79-95
    • /
    • 2002
  • In this paper the consumer protection regulations of 16 wide area self-governments in Korea are studied. Status of consumer protection policy committees and their general policies for consumer protection of these wide area self-governments are also investigated. The data of consumer protection regulation were collected from the internet web-site of each self-government and the status of consumer protection policy committee and the general policy for consumer protection were obtained by requesting each self-government to report administration information during May through October in 200l. 13 of 16 wide area self-governments except Daegu, Inchon, and Jejudo have own consumer protection regulations. Major parts of these regulations conform the standard regulation of ministry of Government Administration and Home Affairs. Many of the consumer protection policy committees reported that they do not have meetings constantly. Moreover since the price of goods and services is the typical subject of meetings, the committees do not seem to properly play the role of a consumer protection policy authority. Contents of the general policy for consumer protection of many self-governments are simple description of detailed practicing plans according to the general consumer protection policy of the national government. By criticizing the problems aroused during the study of consumer protection policy of self-governments, suggestions are given which will help for the development of consumer policy of wide area self-governments.

Unequal Error Protection for the Wireless ATM with Turbo Coding (무선 ATM에서 터보코딩을 사용한 UEP)

  • 문병현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.8A
    • /
    • pp.1322-1328
    • /
    • 2001
  • 본 논문에서는 무선 ATM 환경에서 터보코딩을 이용한 UEP(Unequal Error Protection)을 제안한다. 일반적으로 ATM셀의 header 부분은 payload 부분보다 중요시되며 header 부분에 payload 보다 부호율이 낮은 터보코드를 무선 ATM 적용하여 비트오류확률과 셀손실 확률을 구하였다. 무선 ATM 환경에서 터보코드를 사용하고 프레임길이 28바이트의 DLC 셀구조에서 UEP가 가능함을 보였다. 부호율 1/3인 터보 코딩을 이용한 경우 동일한 부호율의 컨벌루션 코드를 이용한 EEP(Equal Error Protection)과 비교하여 비트 오류확률과 셀 손실율에 있어서 최소 1dB와 2dB 신호대잡음비의 개선을 보였다.

  • PDF

A Study on the Fire Protection Safety of the Public-utilization Shops (다중이용업소의 소방안전기준에 관한 연구)

  • Kim, Yeob-rae
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.10-21
    • /
    • 2009
  • This study contains the fire protection safety of the public-utilization shops. The toll of fires in the public-utilization shops is so heavy in spite the less occurency. The shops are mostly compartmented into small rooms by partition wall which hinders the evacuation of the people on fire. This study provides additional requirements on the fire safety of the public-utilization shops needed for human life and property.

  • PDF

A Tabu Search Method for K-anonymity in database privacy protection

  • Run, Cui;Kim, Hyoung-Joong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.990-992
    • /
    • 2011
  • In this paper, we introduce a new Tabu method to get K-anonymity character in database information privacy protection. We use the conception of lattice to form the solution space for K-anonymity Character and search the solution area in this solution space to achieve the best or best approach modification solution for the information in the database. We then compared the Tabu method with other traditional heuristic method and our method show a better solution in most of the cases.

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.

A Study on Public Order Right Based on Analysis of the Administrative Disposition Results Against the Personal Information Protection Act Violation (개인정보 보호법 위반에 따른 행정처분 결과 분석을 통한 공표명령권 도입 연구 395)

  • Jeon, Ju Hyun;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.395-402
    • /
    • 2022
  • In case of violation of the Personal Information Protection Act, administrative dispositions will be taken according to the legal standards, and the results will be announced. However, the current method has limitations in its effectiveness as repeated administrative dispositions are increasing despite the announcement by the disclosure system of the Personal Information Protection Act. In this paper, we deploy the introduction of the 'public announcement commandment' against violators by analyzing the administrative disposition results according to the violation of the Personal Information Protection Act. It is able to strengthen the existing disclosure system for self-disclose violations by providing easy recognition to the people about the fact of violation itself against the Personal Information Protection Act. Furthermore, we analyze major industries through the industry groups and violations of laws that were subject to publication, and data published on the results of administrative dispositions for violation of the Personal Information Protection Act. Finally, we propose the legal basis for the 'public announcement commandment' which allows the violator to publish by oneself for the announcement of the fact that the corrective action has been taken.

An Unequal Protection FEC Scheme for Video over Optical Access Networks

  • Cao, Yingying;Chen, Xue;Wang, Liqian;Li, Xicong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1463-1479
    • /
    • 2013
  • In this paper, we propose an unequal protection physical coding sub-layer (PCS) forward error correction (FEC) scheme for efficient and high-quality transmission of video data over optical access networks. Through identifying and resolving the unequal importance of different video frames and passing this importance information from MAC-layer to PCS, FEC scheme of PCS can be adaptive to application-layer data. Meanwhile, we jointly consider the different channel situations of optical network unit (ONU) and improve the efficiency of FEC redundancy by channel adaptation. We develop a theoretical algorithm and a hardware method to achieve efficient FEC assignment for the proposed unequal protection scheme. The theoretical FEC assignment algorithm is to obtain the optimal FEC redundancy allocation vector that results in the optimum performance index, namely frame error rate, based on the identified differential importance and channel situations. The hardware method aims at providing a realistic technical path with negligible hardware cost increment compared with the traditional FEC scheme. From the simulation results, the proposed Channel and Application-layer data Adaptation Unequal Protection (CAAUP) FEC scheme along with the FEC ratio assignment algorithm and the hardware method illustrates the ability of efficient and high-quality transmission of video data against the random errors in the channel of optical access networks.