• Title/Summary/Keyword: personal information collection

Search Result 231, Processing Time 0.028 seconds

Utilization of Wood Collections Using a Database Program for Personal Computers (퍼스널 컴퓨터용 데이타베이스 프로그램을 이용한 목재 재감의 효율적 이용)

  • Lee, Kyoung-Eun;Park, Won-Kyu
    • Journal of the Korean Wood Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.43-48
    • /
    • 1992
  • A database system for retrieving the information on wood collections was developed using the D-BASE III Plus program for personal computers. Basic information of biological, physical, chemical and technological properties was added to the data which used to be employed in simple card systems, such as identification number, species name and collection site. All information was fast and reliably retrievable. This paper also discussed the results of a survey on wood collections housed at domestic colleges and research institutes.

  • PDF

Implementation of Personal Certification Using i-PIN Service (i-PIN 서비스를 활용한 인증 서비스 구현)

  • Kim, Hyun-Joo;Shin, In-Chul;Lee, Soo-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.7
    • /
    • pp.117-128
    • /
    • 2012
  • Recently IT infrastructure plays a central role in the base of the society. However, use of personal registration number on internet sites has become a major factor increasing danger of leaking of personal information. Currently, the government is recommending various information protection services in order to prevent the collection of personal registration numbers and leaking of personal information on the internet. Among them, i-PIN service is the one recommended for minimal use of personal registration numbers on the internet. Although i-PIN can be used as a way to substitute personal registration numbers on the internet, there are certain limitations in using i-PIN as the only key to recognize individuals. This study proposes organization of web system in which self certification can be conducted using i-PIN as a tool for personal certification. Also its usability and stability have been verified through performance test when i-PIN service is linked with web service and used as personal certificate. But i-PIN service is unavailable if obstacles occur in providers of i-PIN self certification. To settle this inconvenience, the study also proposes how to cope with such obstacles.

Performance Improvement of a Movie Recommendation System based on Personal Propensity and Secure Collaborative Filtering

  • Jeong, Woon-Hae;Kim, Se-Jun;Park, Doo-Soon;Kwak, Jin
    • Journal of Information Processing Systems
    • /
    • v.9 no.1
    • /
    • pp.157-172
    • /
    • 2013
  • There are many recommendation systems available to provide users with personalized services. Among them, the most frequently used in electronic commerce is 'collaborative filtering', which is a technique that provides a process of filtering customer information for the preparation of profiles and making recommendations of products that are expected to be preferred by other users, based on such information profiles. Collaborative filtering systems, however, have in their nature both technical issues such as sparsity, scalability, and transparency, as well as security issues in the collection of the information that becomes the basis for preparation of the profiles. In this paper, we suggest a movie recommendation system, based on the selection of optimal personal propensity variables and the utilization of a secure collaborating filtering system, in order to provide a solution to such sparsity and scalability issues. At the same time, we adopt 'push attack' principles to deal with the security vulnerability of collaborative filtering systems. Furthermore, we assess the system's applicability by using the open database MovieLens, and present a personal propensity framework for improvement in the performance of recommender systems. We successfully come up with a movie recommendation system through the selection of optimal personalization factors and the embodiment of a safe collaborative filtering system.

A Study on Reinforcing Non-Identifying Personal Sensitive Information Management on IoT Environment (IoT 환경의 비식별 개인 민감정보관리 강화에 대한 연구)

  • Yang, Yoon-Min;Park, Soon-Tai;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.34-41
    • /
    • 2020
  • An era of stabilizing IoT markets and rapid expansion is coming. In an IoT environment, communication environments where objects take the lead in communication can occur depending on the situation, and communication with unspecified IoT environments has increased the need for thorough management of personal sensitive information. Although there are benefits that can be gained by changing environment due to IoT, there are problems where personal sensitive information is transmitted in the name of big data without even knowing it. For the safe management of personal sensitive information transmitted through sensors in IoT environment, the government plans to propose measures to enhance information protection in IoT environment as the use of non-identifiable personal information in IoT environment is expected to be activated in earnest through the amendment of the Data 3 Act and the initial collection method.

A Study of Self-Checklist for Personal Information Protection of FinTech Service: For the Simple Payment Service (핀테크 서비스의 개인정보보호 자가평가항목 개발에 관한 연구: 간편결제 서비스 중심)

  • Kang, Min Soo;Back, Seung Jo;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.77-102
    • /
    • 2015
  • FinTech service industry has been growing rapidly around the world. It has driven innovation in financial and payment service industry with different channels such as mobile based on Information and Communications Technology (ICT). However, FinTech service is vulnerable to different security threats due to use the valuable data such as personal information and financial information. It is undeniable that collection and use of those information may increase the possibility of identity theft or privacy breach. In this paper will develop a self-checklist for the Simple Payment service users (Privacy Pragmatists) who want to make a rational decision to protect their personal information. The checklist is going to let the users assess the personal information protection by performing the assessment themself when they use the service. The body of this paper is going to analyze the items of the checklist and through the analysis, will suggest a security policy for personal information protection of FinTech service.

The Effect of Privacy Policy Awareness on the Willingness to Provide Personal Information in Electronic Commerce (전자상거래의 프라이버시 정책 인식이 개인정보제공의도에 미치는 영향)

  • Jongki Kim;Dawoon Oh
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.185-207
    • /
    • 2016
  • This study investigated the relationship between privacy policy awareness and willingness to provide personal information. Online privacy policies published on the Internet aim to build the trust of consumers and reduce their concerns about the provision of providing personal information. This study uses FIP(FIP; Fair Information Practices) principles to measure awareness of privacy policy. The result of the survey indicates significant relationships among awareness of privacy policy of e-commerce websites, privacy trust, and privacy risk. Privacy policy aims to improve transparency of collection and use of personal information. A high level of privacy trust is related to a high level of willingness to provide personal information on an e-commerce website. A low level of privacy risk is related to a high level of willingness to provide personal information on an e-commerce website. This study found that disposition to trust moderates the relationship between privacy policy awareness and privacy trust. This study contributes to further research on the relationships among privacy policy awareness, privacy trust, and privacy risk. The result of this study can be used by companies that aim to build privacy trust and reduce privacy risk.

Improvement of Selective Consent Method in the Collection Process of Personal Information of Financial Institutions (금융기관의 개인정보 수집 절차 중 선택적 동의 방식의 개선방안)

  • Sun, Jong-chun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.123-134
    • /
    • 2020
  • Although the rights of data subjects are defined through laws such as the Personal Information Protection Act, the consent process for collecting personal information by financial institutions is only formal and does not guarantee the right of self-determination of personal information. Therefore, it is necessary to analyze the problem by information provision items of the current model, and to improve by changing the structure such as replacing the current method provided with the text with pictures and videos, and mandatory to provide the information subjects with personal information flow related images from the signing up stage. The improvement model is presented as a way to add a procedure to the current model. The effect was verified through a survey. It is hoped that the proposed model is actually reflected through the review to create an environment that can be a true meaning agreement that reflects the information subject's right to self-determination.

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

A Study on the Improvement of the Malware Evidence Collection Module Based On Windows (윈도우 기반 악성코드 증거 수집 모듈 개선에 관한 연구)

  • Heo, Geon-Il;Park, Chan-Uk;Park, Won-Hyung;Kuk, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.61-68
    • /
    • 2010
  • Recently a malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection tools do not provide evidences conveniently or sometimes cannot provide necessary evidences. So security officials have much difficulty in responding to malwares. This paper analyzes the current status and problems of the existing malware evidence collection tools and suggests new ways to improve those problems.

Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory (페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로)

  • Yu, Jae Ho;Lee, Ae Ri;Kim, Kyung Kyu
    • Knowledge Management Research
    • /
    • v.17 no.1
    • /
    • pp.17-47
    • /
    • 2016
  • People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privacy concerns about inappropriate collection and use of personal information increase in SNSs (e.g., Facebook). Although people have privacy concerns in SNSs, they behave in a contradictory way, voluntarily presenting themselves and disclosing personal information. This phenomenon is called 'privacy paradox'. Using dual factor theory, this study investigates the phenomenon of privacy paradox by looking into enablers (e.g., self-presentation) and inhibitors (e.g., information privacy concern) for continuous use of Facebook that can co-exist independently of each other. It also includes antecedents of self-presentation (i.e., narcissism, need for affiliation, involvement, and self-efficacy) and those of information privacy concern (i.e., previous experience of privacy infringement, privacy awareness, and privacy control). The results show that most hypothesized relationships were supported. These findings provide strategic implications for SNS providers who want to promote continuous use of SNS. Under the current circumstances in which enhanced privacy policies are required, this study would be a useful reference for future research on information privacy issues in SNSs.

  • PDF