• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.028 seconds

The Role of Mothers in Children's Privacy Protection on the Internet (인터넷에서의 아동의 프라이버시 보호와 어머니의 역할)

  • Kim, So-Ra
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.2
    • /
    • pp.59-71
    • /
    • 2008
  • The purpose of this study was to discuss the role of mothers in children's privacy protection on the Internet. Specifically, the study explored 1)children's privacy protection efforts on the Internet, 2)types of personal information children provided at Web sites, and 3)the effect of mothers' privacy protection efforts on their children's privacy protection levels. The Internet survey was conducted and total of 153 mothers and their children aged 12-13 were included for statistical analysis. The descriptive statistics and Ordinary Least Squares were used. The results yield that children showed relatively high levels in providing personal information on the Internet, while they have no sufficient competency at privacy protection. The effect of mothers' privacy protection efforts on children's privacy protection was partially supported. The longer hours of Internet use and frequent participation in online events increased the potential consequences of children's privacy invasion. Providing privacy standards for online service providers and marketers targeting children could help protect children's privacy. Moreover, education program targeting parents and children could contribute them reduce potential consequences of children's privacy invasion.

Study on Social Network Service(SNS) Users' Privacy Protection Behavior : Focusing on the protection motivation theory (소셜 네트워크 서비스(SNS) 이용자들의 개인정보보호 행동에 관한 연구: 보호동기이론을 중심으로)

  • Kim, Jung-Eun;Kim, Seong-Jun;Kwon, Do-Soon
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.1-30
    • /
    • 2016
  • Purpose The purpose of this study is to grasp the factors influencing domestic SNS users' privacy protection behavior and verify their relationship through self-efficacy and responsiveness. Thus, this study tries to suggest efficient and effective measures for SNS personal information protection. Design/methodology/approach To this end, with main variables of the protection motivation theory based on the assumption that when users are exposed to the threat to their health, they would have protection motivation and change their behavior of protecting their health, a research model was suggested. In addition, in order to empirically verify the research model, a survey was performed targeting general college students having the experience of using SNS. Findings As a result of the analysis, first, perceived effectiveness and self-efficacy had a positive effect on responsiveness. Second, perceived barrier had a positive effect on self-efficacy. Third, self-efficacy and responsiveness had a positive effect on privacy protection behavior. This study is expected to contribute to establishing an effective guideline for measures that could induce SNS users' privacy protection behavior.

Protection Switching Methods for Point-to-Multipoint Connections in Packet Transport Networks

  • Kim, Dae-Ub;Ryoo, Jeong-dong;Lee, Jong Hyun;Kim, Byung Chul;Lee, Jae Yong
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.18-29
    • /
    • 2016
  • In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks. We introduce two types of per-leaf protection-linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes - tree protection and hybrid protection - are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per-leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper.

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers (개인정보보호 활동 결정요인 연구: 개인정보처리자를 중심으로)

  • Jang, Chul-Ho;Cha, Yun-Ho
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.64-76
    • /
    • 2021
  • The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.

Improvement Research for Information Protection Management System of Small and Medium Enterprises (중소기업의 정보보호 관리체계 개선방안 연구)

  • Hye-Joung Yun;Yong-Woo Lee;Hee-Doo Heo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.15-20
    • /
    • 2023
  • Recently, digitalization is accelerating in all industries, and the use of information and personal information produced and used in the process of it is very important for the success or failure of a company. However, malicious attempts to steal or leak major information and personal information of a company as an adverse effect continue to increase, and appropriate defense and response are absolutely necessary. However, in the case of small and medium-sized enterprises, the priority of information protection and the possession of professional manpower are very insufficient compared to large enterprises. This paper studies the certification and audit implemented in Korea, and suggests ways to expand the certification of the information protection system suitable for SMEs and improve the effectiveness of the support system through the expansion of the privacy law notification standard and operation of support system.

The information process on labor and the protection of information human rights (노동정보처리와 정보인권보호)

  • 하우영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.17-32
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers' side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers' side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals' with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

A Study on the Privacy Protection Trends and Policies of Korea·the U.S.·EU (한·미·EU의 개인정보보호 동향 및 정책에 대한 고찰)

  • Cho, Sae-Hong
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.244-248
    • /
    • 2022
  • The various digital services that people are experiencing recently are bringing about changes in the daily lives, and these changes are due to the spread of the Fourth Industrial Revolution. The 4th Industrial Revolution is based on the development of ICT technology, and ICT technology inevitably generates issues such as the use and protection of personal information as well as the use of public data. Accordingly, countries around the world are making efforts to revitalize new industries by wisely solving conflicting issues between the use and protection of personal information through legislation. There are some differences in the protection and use of personal information in Korea, the United States, and the EU. Korea trys to make the legislation that prioritizes the use of data, and the United States establishes individual laws governing the protection of personal information by sector, while the EU has clarified the strengthening personal information protection. This paper aims to find out how personal information protection is defined in Korea, the United States, and the EU through enacted laws and organize the direction of the future policies.

Agent-based Colored Petri Net Modeling of Grid Information Flows : Modeling of Wide Area Protection System (에이전트 기반 컬러 페트리 넷을 이용한 전력 계통의 정보 흐름 모델링: 광역 보호 시스템에의 적용)

  • Park, Byung-Sung;Hur, Kyeon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.7
    • /
    • pp.1347-1353
    • /
    • 2011
  • While most of the existing protection schemes have been designed with local information around individual components, these local schemes are not considered capable of protecting the modern electric power gird with growing complexity. Recent blackouts in North America and Europe have renewed the emphasis on coordinated protection and control actions to avoid systemwide blackouts, utilizing all of the available grid information. Thus, this paper proposes a new methodology, Agent-based Colored Petri Net (ACPN) modeling for systematically representing, modeling and analyzing information flows and interactions among the entities of the electric power grid. The paper demonstrates its efficacy and accuracy by investigating an ACPN model of a wide area protection system for a typical power grid. The proposed modeling and analysis schemes may further provide a framework to help assure reliability and interoperability of diverse smart grid components.

A Role-play Approach for Privacy Protection Inspiration of Elementary Students

  • Park, Gwi-Ja;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.12
    • /
    • pp.1796-1808
    • /
    • 2009
  • Elementary school students have a little awareness of privacy protection since they do not have many opportunities for systematic education on information and communication ethics. Hence, they are likely to expose their own information to others and sometimes bring on a lot of misuses by using others' information. In this paper, we provide an idea for teaching and learning methods which the elementary school students acquire privacy protection and management methods and raise their practical capabilities. We develop a role play teaching and learning model in connection with various Information and Communication Technology (ICT) activities and establish the instruction plans. Moreover, we apply them to the actual classes at grade five and six of the elementary school students respectively, and finally analyze the results. The proposed teaching and learning method shows that the students participated in a series of learning activities have higher learning effects on awareness of privacy protection than those learned with the conventional methods.

  • PDF

A Study on Establishing Guidelines for Information Protection and Security for Educational Institutes (학내 정보보호지침 수립에 관한 연구)

  • Yu, Ki-Hun;Choi, Woong-Chul;Kim, Shin-Kon;Goo, Chun-Yul
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.23-43
    • /
    • 2008
  • Because IT security guidelines for universities and colleges mostly focus on hardware aspects, the problems such as security incidents by a user's mistake and personal information leakage by hacking are serious in our higher educational institutes. In order to solve these information protection and security problems in the educational institutes, realizable and implementable information protection and security guidelines which will contribute to escalate information protection level should be established and at the same time, specific guidelines should be provided to make the guidelines efficient. In this paper, the information security problems and cases are categorized to develop information security guidelines for the higher educational institutes in terms of short, mid, and long term aspects and the solutions to the problems are sought. In addition, a serious of approaches to the information security are proposed such as the improvement measures for the employees of the institute to have desirable security-minded, security problem prevention and resolving methods, developing conflict coordination procedure and law and regulation system establishment for making the educational institutes be information-oriented.