• Title/Summary/Keyword: personal information management

Search Result 1,764, Processing Time 0.032 seconds

Personal Strengths Knowledge Is the Key to Employability: Implications for Library and Information Science and Career Development Education for Its Students (취업력 제고의 관건으로서 개인강점 지식 - 문헌정보학과와 사서의 경력개발교육에 주는 의미 -)

  • Cho, Byung-Ju;Choi, Jung-Hee;Oh, Dong-Geun
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.4
    • /
    • pp.243-259
    • /
    • 2009
  • This study introduces strengths theory, a core subject of career development and job-getting, and discusses about the factors of strengths(namely talents, knowledge and skills), the processes of strengths personalization, and generating employability. It searches for opportunities to apply the concept of employability to the field of Library and Information Science now thrown under hard pressure from information and communication technology. Employability is defined here as competence to make oneself employable as needed by discovering or creating work opportunities using one's own tested personalized strengths. Employability is a package of systematically organized information about the essential abilities and productive personalities of a person, and it is essential to be duly cognitive of one's employability if one seriously intends to succeed in jobs and career. Since generation of employability heavily involves complex processes of information and knowledge-making, expertise from LIS, particularly from areas of personal information management(PIM) and personal knowledge management(PKM), is expected to help for process facilitation.

  • PDF

COVID-19 Related Personal Information Issues and Countermeasures from the Perspective of Record Management (기록관리 관점에서 본 코로나 19 관련 개인정보 이슈와 대응방안)

  • Jeong, Ji-Hye;Na, Jeong-Ho;Jang, Ji-Hye;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.81-107
    • /
    • 2020
  • At a time when Korea and the rest of the world recently faced the unprecedented situation of "COVID-19," the view of actively "disclosure" of information to prevent the spread of infectious diseases is at odds with the view of "protecting" personal information as these social measures are coupled with the infringement of individuals' basic rights. In order to see the nation's response to the infectious disease crisis, we examined the current status and characteristics of public records according to crisis alert levels based on the manual for responding to infectious disease. Especially we analyzed the types and disclosure status of records containing personal information. For detecting personal information-related issues on news media, we collected online news articles and performed text anlaysis. Through this, we reviewed the problems of record management including personal information and suggested improvement points from the perspective of the life cycle of records: collect, manage, and dispose of them.

A Study on the de-identification of Personal Information of Hotel Users (호텔 이용 고객의 개인정보 비식별화 방안에 관한 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.51-58
    • /
    • 2016
  • In the area of hotel and tourism sector, various research are analyzed using big data. Big data is being generated by any digital devices around us all the times. All the digital process and social media exchange produces the big data. In this paper, we analyzed the de-identification method of big data to use the personal information of hotel guests. Through the analysis of these big data, hotel can provide differentiated and diverse services to hotel guests and can improve the service and support the marketing of hotels. If the hotel wants to use the information of the guest, the private data should be de-identified. There are several de-identification methods of personal information such as pseudonymisation, aggregation, data reduction, data suppression and data masking. Using the comparison of these methods, the pseudonymisation is discriminated to the suitable methods for the analysis of information for the hotel guest. Also, among the pseudonymisation methods, the t-closeness was analyzed to the secure and efficient method for the de-identification of personal information in hotel.

A Study of the Change Method of Korean Resident Registration Number (주민등록번호 변경 방법에 대한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.65-74
    • /
    • 2016
  • The Korean resident registration number has been used since 1962 as a personal identification number. The Korean government assigns this number to each korean citizen and it is not able to be changed. In 2000s, as the Internet was rapidly spreaded out, personal information such as the Korean resident registration number, name, home address, and phone number was leaked. The companies provide diverse internet service while collecting personal information. However, personal information was sometimes leaked because of hacking, poor information management and so on. As s results, some of citizens asked government and court of Korea to change the Korean resident registration number because they suffered material damage and emotional distress. The constitutional court decided to be able to change the number from 2018. In this study, the Korean resident registration number which is possible to change, serial number, public certificate, I-PIN, and My-PIN were analyzed comparatively. In addition, considerations when the Korean resident registration number was changed were discussed. The public certificate and I-PIN were appropriate to the case of on-line Korean resident registration number. The Korean resident registration number, serial number, My-PIN were appropriate to the case of off-line Korean resident registration number. Lastly, it would be efficient to manage the Korean resident registration number separately such as on-line and off-line.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

A Review of Studies on personal information (개인정보 연구동향과 과제)

  • Bang, Min Seok;Oh, Cheol H.
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.3-16
    • /
    • 2014
  • The personal information is now considered more valuable and important topic in this highly improved knowledge information society. In this research, 50 research papers and government reports between 2000 and 2013 are analysed to understand a trend of academic research of the personal information. To summarize of the result of the analysis, firstly, there are many discussions and emphases to governmental protections of the personal information, mainly in the qualitative and legal system level. Secondly, there are insufficient researches of the personal information, particularly in the academic field rather than government and national research institutes. Thirdly, there are not sufficient investigations to approach influential reasons and relations of cause and effect, though there are much enough researches on the actual and present conditions of the protection of the personal information. To develop the investigation of the personal information, it needs to be considered to research more about systematic approach to the issue of personal information, expansion of research area considering the changeable IT environment, diverse methodological experiment like a metrical way, reformation of investigation system, and improved information management in the private sector.

Expanding the Scope of Identifying and Linking of Personal Information in Linked Data: Focusing on the Linked Data of National Library of Korea (링크드 데이터에서 인물 정보의 식별 및 연계 범위 확장에 관한 연구: 국립중앙도서관 링크드 데이터를 중심으로)

  • Lee, Sungsook;Park, Ziyoung;Lee, Hyewon
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.7-21
    • /
    • 2017
  • This study analyzed the methods for representing and linking personal information in the linked data of National Library of Korea and provided suggestions for expanding the scope of identifying and linking of the personal information. As a result, the personal information as a subject has been dealt with a concept, where the personal information as a contributor has been linked with a vocabulary of personal name. In addition, there have not been assured of including additional information except existing authority data in the process of building the linked data. Therefore, this study suggested that linking personal information as a subject and personal information as a contributor was essential for the quality of linked data. In addition, we proposed to provide additional information related to the person in linked data for expanding the scope of access points in information discovery.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

The Value of Personal Information: An Exploratory Study for Types of Personal Information and Its Value

  • Minjung Park;Sangmi Chai
    • Asia pacific journal of information systems
    • /
    • v.28 no.3
    • /
    • pp.154-166
    • /
    • 2018
  • As the number of online privacy incidents are increasing, lawsuits related with personal information infringements have been also growing as well. However, there are large differences between a plaintiff and a defendant to determine the amount of payment for damages from the incident. After the verdict was made, a plaintiff is not satisfied with the amount of compensation, whereas a defendant usually tries to their best to reduce the payment amount. This is because the value for personal information are hardly assessed exactly. In addition, there is no criteria for calculating the price of the information itself. Since the development of information technology enables the firms could collect and use any piece of information to identify a particular individual, the range of personal information has been also broadening. Based on these phenomenon, this study tries to grouping the types of personal information and exploring the perceived value of types of information. Therefore, this study could provide a foundation for narrowing the gap of the value of personal information between the firm and the defendant. Through AHP (Analytic Hierarchy Process), this study finds out that people usually value more on biometrics information, medical records, and criminal records whereas weigh less for email address and date of birth.