• Title/Summary/Keyword: personal information management

Search Result 1,764, Processing Time 0.037 seconds

The Proposal of System Structure for Using Safe Personal Mobility Devices (안전한 개인형 이동장치 사용을 위한 시스템 구조 제안)

  • Kim, Wantae;Park, Byungjoon;Kim, Hyunsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.33-41
    • /
    • 2022
  • Recently the use of personal mobility devices is rapidly increasing, and the businesses related to personal mobility devices are quickly growing as well. Although the use of personal mobility devices provides convenience for short distance movements, many problems occur due to the lack of safety devices and the absence of associated road traffic laws. The number of accidents caused by using personal mobility devices continues increasing every year, and the injuries or deaths are seriously happening with those accidents. When using personal mobility devices, there are basic safety precautions such as wearing a helmet, prohibiting boarding with more than two people, prohibiting boarding with more than 100kg, prohibiting using after drinking alcohol, and so on. However, it is exposed to traffic accidents because there is no way to check before using the system. Therefore, to ensure the user's safety in using the electric kickboard among personal mobility devices, this paper proposes a system that can check the user's safety state before using the electric kickboard. It is possible to safely use personal mobility devices and prevent accidents by proposing a system structure of the electric kickboard that can be used after checking for the use of more than two people, overweight, wearing a helmet, and drinking alcohol.

A Study on the Personal and Social Acceptability of Personal Information Disclosure of COVID-19 Confirmed Patients (코로나19 확진자 개인정보 공개의 개인적, 사회적 수용성에 관한 연구)

  • Oh, Juyeon;Suh, Woojong
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.49-61
    • /
    • 2021
  • In a disaster situation such as COVID-19, our society has experienced the spread of the damage due to confirmed patients who have a negative or uncooperative attitude toward the disclosure of personal information. Accordingly, this study aims to find a policy direction that can improve the awareness of the disclosure of personal information about confirmed COVID-19 patients. This study classified the concept of acceptability into personal and social acceptability, and statistically verified their relationship with influential factors. In this study, 594 cases of data collected through an online survey were used. The analysis results show that the greater the trust in the government's personal information management capability, the lower the perception of the risks associated with the disclosure of personal information, and the lower the awareness of the risk, the higher the personal and social acceptability of the personal information disclosure of COVID-19 confirmed patients. In addition, the greater the recognition of the utility of personal information disclosure, the higher the perception of personal and social acceptability of the personal information disclosure. It is expected that the analysis results and discussions of this study will be useful information for policy development to create a more mature social atmosphere to reduce the public's reluctance to disclose information not only in COVID-19 but also in new disaster situations in the future.

A Study on a Model for Personal Digital Library(PDL): Based on the User's Information Seeking Behavior (PDL 모형 개발에 관한 연구: 이용자 정보추구 행태 기반)

  • Kim, Kyung-Gon
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.2
    • /
    • pp.177-198
    • /
    • 2003
  • The most significant part of this study is in developing an experimental medel of user-friendly PDL. This study proposes both theoretical (conceptual) and physical (operational) models. The theoretical model includes the analysis on various factors and the realtionsips among factors which have a serious impacts on the design, building, and managing of PDL. And the physical model shows the shows the detailed structure and process which could be useful for both PDL designers and managers. Also provided is the images of major user interfaces, of which a PDL would be developed on the basis of the proposed medel in near future.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

The Development of Monitoring System for PC and Server State Management (PC 및 서버 상태관리를 위한 모니터링 시스템 개발에 관한 연구)

  • Ryu, Chang-ju;Han, Seung-jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1741-1746
    • /
    • 2016
  • Recently, technology using a PC and the personal server efficiently has been highlighted in accordance with the historical background. Solutions for large enterprises and public institutions and PC and personal server management are being commercialized for fee. Paying a fee for PC and personal server management being a burden and commercialized solutions include a function that does not require. In this paper, proposed the PC and personal server management system include monitoring that cpu, hdd, memory, respond speed. It expects to extend the PC and service life is available without charge through the free distribution of the burden. The Development program and application is available for free from the android market and on-line. Server agent program of the proposed system operates based on a single-threaded system. That is low load and the low functional burden on the server.

Digital Contents Control for Desktop Virtualization: A Case of Virtual Folder Based Implementation (데스크톱 가상화에 따른 디지털콘텐츠 통제방안: 가상폴더방식의 구현사례)

  • Yoon, Han Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.1-9
    • /
    • 2014
  • Recently, with the enlargement of cloud computing, virtual desktop infrastructure(VDI) can be an alternative of the existing personal computer based information environment. For the case of partially introduced VDI coexisting with personal computer environment, we suggest a virtual folder based approach to control the overall digital contents within an organization with a case of implementation. Although a centralizing device was used for storage and sharing of organization's digital contents, it was not easy to accomplish centralizing digital contents completely. It is tried to prevent users from utilizing their own storage in their personal computers or virtual machines and to use virtual folder which transfer and store digital contents to and in EDMS. The virtual folder system of this paper looks like a real folder in a personal computer, but it is another virtual device for outer storage devices including EDMS. It can be an alternative and reference of digital contents control for future applications of cloud computing.

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

Antecedents of Users' Intentions to Give Personal Identification Information and Privacy-Related Information in Social Media (소셜 미디어에서 개인 식별 정보와 사생활 정보 공유 의지에 영향을 미치는 요인)

  • Kim, Byoungsoo;Kim, Daekil
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.127-136
    • /
    • 2019
  • In the social media, information that users share with service providers can be divided into personal identification information such as gender and age and privacy-related information such as photos and comments. However, previous works on IS and service management have shed relatively little light on the difference of information-sharing decisions depending on the type of information. This study examines information-sharing decisions by separating the two types of information. A structural equation modeling method is used to test the research model based on a sample of 350 Facebook in South Korea. Analysis results show that self-expression, trust, and perceived security had a significant positive effect on both user's intentions to give personal identification information and their intentions to give privacy-related information. However, privacy concerns negatively affected their intentions to give personal identification and intention to give privacy-related information. The analysis results confirm that there was no difference between decision-making processes about sharing personal identification information and ones about sharing privacy-related information.

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.