• 제목/요약/키워드: information Protection

검색결과 4,490건 처리시간 0.027초

개인정보처리방침의 데이터를 활용한 개인정보보호 현황 분석 (Analysis of Personal Information Protection Circumstances based on Collecting and Storing Data in Privacy Policies)

  • 이재근;강상욱;염흥열
    • 정보보호학회논문지
    • /
    • 제23권4호
    • /
    • pp.767-779
    • /
    • 2013
  • 개인정보보호 분야는 타 분야에 비해 통계 및 현황에 대한 정보가 부족하다. 또한 개인정보보호 분야는 정보화, 정보보안, 법 등 어느 분야에도 일방적으로 속하지 않아 부수적으로만 실태 파악이 되고 있어 앞으로도 한계가 있을 것이다. 본 논문에서는 약 11만 개의 개인정보처리자가 공개하고 있는 개인정보 처리방침을 이용하여 방대한 양의 데이터를 수집하고 저장하여 이를 분석할 수 있는 방안을 제시하고 실제 결과를 보여준다. 제시된 방안은 데이터의 품질이 보장되고 시간과 비용을 절감할 수 있어 기존 방식에 비해 결과에 대한 정확성과 현황 파악에 대한 신속성에 있어 유리하다. 또한 다양한 분석이 가능하여 개인정보보호에 대한 실태 파악의 새로운 돌파구 역할을 할 수 있다. 본 논문에서는 개인정보보호와 빅데이터 분야의 접목을 통해 개인정보보호의 발전 방안을 제시하고 있다.

의료정보 유출의 문제점과 의료정보보호 (The Medical Information Protection and major Issues)

  • 전영주
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권12호
    • /
    • pp.251-258
    • /
    • 2012
  • 과거 종이로 기록되던 환자의 의료정보는 점점 현대과학의 눈부신 진화와 발전으로 현재는 종이를 대신하는 전자적 시스템인 전자의무기록시스템 형태로 발전되었다. 또한 병원에서 활용되는 모든 의료정보들이 전자적시스템을 이용하여 활용되고 있는 것이 현실이다. 그러나 과학기술의 발전과 더불어 의료정보의 피해 사례는 계속 증가할 것으로 보인다. 보험사기 예방을 위해 의료정보를 공유해야한다는 보험단체들의 주장, 개인정보를 얻기 위해 금전적 불법거래가 성행되고 있다는 뉴스 등을 접할때면 의료정보 보호에 관한 대책 마련이 절실함을 의미한다. 따라서 의료정보와 관련된 유출상의 문제점을 정확히 파악하는 것은 의료정보 유출의 부작용을 예방하고 의료정보 보호와 미비점을 보완하는 선결과제인 것이다. 따라서 현재의 의료법 및 개인정보보호법제만으로는 의료정보의 표준화와 의료정보보호 등을 규율할 수 없고, 의료정보에서 발생되는 여러 문제들을 보호하기에는 미흡하다고 판단된다. 따라서 본 논문은 미흡한 의료정보관련 법제의 연구를 위한 선결 과제로 의료정보의 유출로 발생될 수 있는 문제점을 파악하는 것이 무엇보다 중요하다고 판단되며, 이에 의료정보의 유출로 인한 문제점을 파악하고 의료정보를 보호할 수 있는 입법방안을 중심으로 연구하고자 한다.

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권6호
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

개인정보보호법제 관점에서 본 블록체인의 법적 쟁점 GDPR 및 국내 개인정보보호법을 바탕으로 (Legal Issues of Blockchain in Personal Information Protection : Based on GDPR and Personal Information Protection Act)

  • 박민정;채상미;이명준
    • Journal of Information Technology Applications and Management
    • /
    • 제25권2호
    • /
    • pp.133-146
    • /
    • 2018
  • The technical definition of Blockchain is commonly known 'distributed ledger', however, there is no legal definition for being accepted in worldwide. Therefore, unless legal definitions and concepts of Blockchain are presented, there is a possibility that various legal disputes will occur in the future in Blockchain environment. The purpose of this study is to derive legal issues related to personal information protection that can be conflicted in Blockchain environment based on domestic Privacy Act and GDPR. The outcomes of this study can prevent various legal disputes and provide solutions that may occur due to the spread of Blockchain. It also suggests the foundation for the improvement of Privacy Act. Finally, it contributes to activate of Blockchain, industry, in Korea.

The System of Radiation Dose Assessment and Dose Conversion Coefficients in the ICRP and FGR

  • Kim, Sora;Min, Byung-Il;Park, Kihyun;Yang, Byung-Mo;Suh, Kyung-Suk
    • Journal of Radiation Protection and Research
    • /
    • 제41권4호
    • /
    • pp.424-435
    • /
    • 2016
  • Background: The International Commission on Radiological Protection (ICRP) recommendations and the Federal Guidance Report (FGR) published by the U.S. Environmental Protection Agency (EPA) have been widely applied worldwide in the fields of radiation protection and dose assessment. The dose conversion coefficients of the ICRP and FGR are widely used for assessing exposure doses. However, before the coefficients are used, the user must thoroughly understand the derivation process of the coefficients to ensure that they are used appropriately in the evaluation. Materials and Methods: The ICRP provides recommendations to regulatory and advisory agencies, mainly in the form of guidance on the fundamental principles on which appropriate radiological protection can be based. The FGR provides federal and state agencies with technical information to assist their implementation of radiation protection programs for the U.S. population. The system of radiation dose assessment and dose conversion coefficients in the ICRP and FGR is reviewed in this study. Results and Discussion: A thorough understanding of their background is essential for the proper use of dose conversion coefficients. The FGR dose assessment system was strongly influenced by the ICRP and the U.S. National Council on Radiation Protection and Measurements (NCRP), and is hence consistent with those recommendations. Moreover, the ICRP and FGR both used the scientific data reported by Biological Effects of Ionizing Radiation (BEIR) and United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) as their primary source of information. The difference between the ICRP and FGR lies in the fact that the ICRP utilized information regarding a population of diverse races, whereas the FGR utilized data on the American population, as its goal was to provide guidelines for radiological protection in the US. Conclusion: The contents of this study are expected to be utilized as basic research material in the areas of radiation protection and dose assessment.

치과에서의 방사선안전관리 (Radiation protection in dental clinic)

  • 이삼선
    • Imaging Science in Dentistry
    • /
    • 제37권3호
    • /
    • pp.117-126
    • /
    • 2007
  • Although the diagnostic information provided by radiographs may be of definite benefit to the patients, the radiographic examination does carry the potential for harm from exposure to ionizing radiation. Therefore we should try to expose radiation as low as reasonably achievable and to give diagnostic information to patients as much as possible. All of dentists should have competence in radiation protection. I wish to deal with what we should do for the optimization of radiation protection in dental clinic.

  • PDF

Dynamic Survivable Routing for Shared Segment Protection

  • Tapolcai, Janos;Ho, Pin-Han
    • Journal of Communications and Networks
    • /
    • 제9권2호
    • /
    • pp.198-209
    • /
    • 2007
  • This paper provides a thorough study on shared segment protection (SSP) for mesh communication networks in the complete routing information scenario, where the integer linear program (ILP) in [1] is extended such that the following two constraints are well addressed: (a) The restoration time constraint for each connection request, and (b) the switching/merging capacity constraint at each node. A novel approach, called SSP algorithm, is developed to reduce the extremely high computation complexity in solving the ILP formulation. Basically, our approach is to derive a good approximation on the parameters in the ILP by referring to the result of solving the corresponding shared path protection (SPP) problem. Thus, the design space can be significantly reduced by eliminating some edges in the graphs. We will show in the simulation that with our approach, the optimality can be achieved in most of the cases. To verify the proposed formulation and investigate the performance impairment in terms of average cost and success rate by the additional two constraints, extensive simulation work has been conducted on three network topologies, in which SPP and shared link protection (SLP) are implemented for comparison. We will demonstrate that the proposed SSP algorithm can effectively and efficiently solve the survivable routing problem with constraints on restoration time and switching/merging capability of each node. The comparison among the three protection types further verifies that SSP can yield significant advantages over SPP and SLP without taking much computation time.

다양성보호계통 사이버보안 연계 위협 분석 방안 (An Analysis Measure for Cybersecurity linked Threat against Diverse Protection Systems)

  • 정성민;김태경
    • 디지털산업정보학회논문지
    • /
    • 제17권1호
    • /
    • pp.35-44
    • /
    • 2021
  • With the development of information technology, the cybersecurity threat continues as digital-related technologies are applied to the instrumentation and control system of nuclear power plants. The malfunction of the instrumentation and control system can cause economic damage due to shutdown, and furthermore, it can lead to national disasters such as radioactive emissions, so countering cybersecurity threats is an important issue. In general, the study of cybersecurity in instrumentation and control systems is concentrated on safety systems, and diverse protection systems perform protection and reactor shutdown functions, leading to reactor shutdown or, in the worst case, non-stop situations. To accurately analyze cyber threats in the diverse protection system, its linked facilities should be analyzed together. Risk analysis should be conducted by analyzing the potential impact of inter-facility cyberattacks on related facilities and the impact of cybersecurity on each configuration module of the diverse protection system. In this paper, we analyze the linkage of the diverse protection system and discuss the cybersecurity linkage threat by analyzing the availability of equipment, the cyber threat impact of the linked equipment, and the configuration module's cybersecurity vulnerability.

환자 개인정보보호에 관한 치과위생사의 지식과 인식도 및 실천도에 관한 연구 (A Study on Dental Hygienist' Knowledge, Awareness and Performance of Patient's Personal Information Protection)

  • 최예진;강현경
    • 한국산학기술학회논문지
    • /
    • 제17권2호
    • /
    • pp.416-426
    • /
    • 2016
  • 본 연구의 목적은 치과위생사들의 환자 개인정보보호에 대한 지식, 인식도 및 실천도를 파악하고자 하였다. 또한 치과위생사의 개인정보보호에 관련된 실천도에 영향을 미치는 요인을 파악하여, 의료기관에서 개인정보보호를 강화하기 위한 방법을 마련하는데 도움이 되고자 시행되었다. 2014년 11월 7일부터 2015년 6월 30일까지 연구의 목적 및 취지 등에 대해 설명한 후 동의를 구한 뒤 자기기입식 설문조사를 시행하였다. 부산, 경남 소재의 치과위생사를 대상으로 210부가 자료분석에 사용되었다. 그 결과, 10년 이상 근무경력자는 실천정도가 유의하게 높게 나타났으며(p<.05), 실장 이상의 직위에서 지식이 높고(p<.01), 실천정도(p<.05)가 유의하게 높게 나타났으며, 10~20명의 근무자가 근무하는 병원(p<.05)에서 인식정도가 유의하게 높게 나타났다. 지식, 인식도 및 실천도의 상관관계에서 지식이 높으면 인식도와 실천도에서 정의 상관관계를 나타내었다(p<.01). 개인정보보호의 지식, 인식도가 치과위생사의 실천도에 미치는 영향을 조사한 결과, 지식(.231)과 인식도(.212)는 실천도에 영향을 미치는 요인으로 나타났다. 치과위생사의 개인정보보호의 실천도를 높이려면 지식의 함양과 인식의 전환이 필요함을 알 수 있었고, 개인정보보호에 대한 인식을 전환하기 위해서는 치과위생사 대상의 교육이 절실하다고 생각된다.

Biological Infectious Watermarking Model for Video Copyright Protection

  • Jang, Bong-Joo;Lee, Suk-Hwan;Lim, SangHun;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • 제11권2호
    • /
    • pp.280-294
    • /
    • 2015
  • This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.