• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.029 seconds

Keywords Analysis on the Personal Information Protection Act: Focusing on South Korea, the European Union and the United States

  • Park, Sung-Uk;Park, Moon-Soo;Park, Soo-Hyun;Yun, Young-Mi
    • Asian Journal of Innovation and Policy
    • /
    • v.9 no.3
    • /
    • pp.339-359
    • /
    • 2020
  • The policy change in the Data 3 Act is one of the issues that should be noted at a time when non-face-to-face business strategies become important after COVID-19. The Data 3 Act was implemented in South Korea on August 5, 2020, calling 'Big Data 3 Act' and 'Data Economy 3 Act,' and so personal information that was not able to identify a particular individual could be utilized without the consent of the individual. With the implementation of the Data 3 Act, it is possible to establish a fair economic ecosystem by ensuring fair access to data and various uses. In this paper, the law on the protection of personal information, which is the core of the Data 3 Act, was compared around Korea, the European Union and the United States, and the implications were derived through network analysis of keywords.

A Preliminary Study to Develop a Parent Education Program Concerning Young Child Sexual Abuse Self-Protection (유아기 자녀 성학대 자기보호 교육을 위한 부모 교육프로그램 개발 기초 연구)

  • Chun, Hui-Young;Lee, Gui-Sook
    • Journal of Families and Better Life
    • /
    • v.27 no.2
    • /
    • pp.213-226
    • /
    • 2009
  • For the purpuse of gathering basic information to develop the education program for parent to become educators of young child for sexual abuse(YCSA) self-protection, 298 mothers of 4- to 6-years old children responded to a questionnaire to measure their needs for YCSA self-protection education and knowledge of characteristics related to YCSA. Results related to the needs of mothers showed that 30.4% of them were educated for YCSA protection and 64.6% had provided YCSA self-protection education to their children. However, it was also found that even mothers who had frequently been educated on protection skills regarding YCSA encountered problems as a result of insufficient information and materials concerning YCSA protection education. The mothers in the study subsequently recommended that from age 4 years young children should be educated about YCSA by parents and teachers together. And most of them expected young children to learn some skills to cope with YCSA, with parent education programs for YCSA also recommended by the mothers. Mothers' characteristics such as knowledge about YCSA, myths and stereotypes toward YCSA showed meaningful correlations with mother's demographic variables, not with children's variables. The study concludes that developing the requested parent education program should be done in consideration of parent's needs and characteristics related to the YCSA self-protection.

A Study on the Correction of Protection Relay of Temporary Electric Power Installations for Storage Tank (저장 탱크용 임시전력설비의 보호계전기 정정에 관한 연구)

  • Son, Seok-Geum
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.562-567
    • /
    • 2020
  • In this paper, this is a study on the correction of protection relays to monitor temporary power facilities for storage tanks especially transformers to block and protect faults such as insulation breakdown. When an abnormality such as a short circuit or a ground fault occurs in the power system, it is important to detect this quickly cut off the device and equipment in which the fault occurred and separate it from the power system to correct the protection relay so that it does not interfere with power supply. In addition the fault current calculation that accurately applies the fault type and the cause of the fault for protection cooperation will be the most important factor in the correction of the protection relay. For protection coordination a study was conducted on the method of coordination for protection of power facility protection for storage tanks such as over current relay, ground over current relay, under voltage relay, and ground over voltage relay applied to temporary.

Biological assessment of streams and rivers in U.S. - design, methods, and analysis

  • Rashleigh, Brenda;Paulson, Steve;Flotemersch, Joe;Pelletier, Peg
    • Journal of Ecology and Environment
    • /
    • v.36 no.1
    • /
    • pp.85-88
    • /
    • 2013
  • Bioassessment is the use of biosurvey data, most commonly for benthic macroinvertebrates and fish, to obtain information about the health of waters in a region. In rivers, bioassessment results are used to evaluate biological condition and trends, to establish relationships between stressors and impairments, and to guide and evaluate management actions.

Research on Personal Information Safety Condition and Improvements in Welfare Center for the Disabled (장애인복지관 개인정보보호 실태와 개선 방안)

  • Kim, Sung-Jin;Kweon, Jae-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.262-274
    • /
    • 2010
  • In Welfare Center for the disabled, under the Government's information acceleration plan, the computer system has been developed starting from work standardization in 2001 but it has been emphasized only on the technical and customer convenience side leaving out preparation for the side effects of them. Therefore this article will seek the necessity of personal information protection, legal basis in the Welfare Center for the disabled. Additionally after analyzing current status for the personal security of Welfare Center for the disabled, establishing an alternative plan for personal security policy's way could be addressed. Increasing education for awareness stress of personal information security, and preparing institutional protection apparatus from applying life cycle of personal information would be an alternative plan for personal information protection for Welfare Center for the disabled. Also frequent monitoring of accessing personal information from the computerized system should be achieved. It is impossible to recover damage caused by leak of personal information although post actions are progressed. From this essay, awareness of personal information protection should be newly revised for both the Social Welfare Organization and the Disabled welfare center, and also technical, institutional strategy's action should be arranged.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Study on Smart Contract for Personal Information Protection (개인정보보호를 위한 스마트컨트랙트 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.215-220
    • /
    • 2019
  • The block chain technology is a technique that prevents manipulation of data and ensures integrity and reliability. Ethereum is building a smart contract environment as a type of encryptionenabled system based on block chains. Smart contracts can be implemented when conditions are met, thus increasing confidence in digital data. However, smart contracts that are being tried in various ways are not covered by information security and personal information protection. The structure in which the network participant can view the open transaction ledger is exposed to data or personal information listed in the block chain. In this study, it is possible to manage the data of personal information recorded in the block chain directly. This study is protected personal information by preventing the exposure of personal information and by executing time code, it is possible to erase recorded information after a certain period of time has elapsed. Based on the proposed system in the future, it is necessary to study the additional management techniques of unknown code defects or personal information protection.

A Study on Personal Information Protection System for Big Data Utilization in Industrial Sectors (산업 영역에서 빅데이터 개인정보 보호체계에 관한 연구)

  • Kim, Jin Soo;Choi, Bang Ho;Cho, Gi Hwan
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2019
  • In the era of the 4th industrial revolution, the big data industry is gathering attention for new business models in the public and private sectors by utilizing various information collected through the internet and mobile. However, although the big data integration and analysis are performed with de-identification techniques, there is still a risk that personal privacy can be exposed. Recently, there are many studies to invent effective methods to maintain the value of data without disclosing personal information. In this paper, a personal information protection system is investigated to boost big data utilization in industrial sectors, such as healthcare and agriculture. The criteria for evaluating the de-identification adequacy of personal information and the protection scope of personal information should be differently applied for each industry. In the field of personal sensitive information-oriented healthcare sector, the minimum value of k-anonymity should be set to 5 or more, which is the average value of other industrial sectors. In agricultural sector, it suggests the inclusion of companion dogs or farmland information as sensitive information. Also, it is desirable to apply the demonstration steps to each region-specific industry.

Structure Optimization of ESD Diodes for Input Protection of CMOS RF ICs

  • Choi, Jin-Young
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.3
    • /
    • pp.401-410
    • /
    • 2017
  • In this work, we show that the excessive lattice heating problem due to parasitic pnp transistor action in the diode electrostatic discharge (ESD) protection device in the diode input protection circuit, which is favorably used in CMOS RF ICs, can be solved by adopting a symmetrical cathode structure. To explain how the recipe works, we construct an equivalent circuit for input human-body model (HBM) test environment of a CMOS chip equipped with the diode protection circuit, and execute mixed-mode transient simulations utilizing a 2-dimensional device simulator. We attempt an in-depth comparison study by varying device structures to suggest valuable design guidelines in designing the protection diodes connected to the $V_{DD}$ and $V_{SS}$ buses. Even though this work is based on mixed-mode simulations utilizing device and circuit simulators, the analysis given in this work clearly explain the mechanism involved, which cannot be done by measurements.