• Title/Summary/Keyword: personal rights

Search Result 204, Processing Time 0.03 seconds

Children's Conceptions of Social Situations and Mothers' Responses in the Home Context (가정 맥락에서 유아의 사회적 상황에 대한 개념과 어머니의 반응인식)

  • Pu, Sungsook;Kim, Heejin
    • Korean Journal of Child Studies
    • /
    • v.28 no.6
    • /
    • pp.135-154
    • /
    • 2007
  • This study examined preschool children's conceptions of social situations and mothers' responses toward their children in the home context. Participants were 78 kindergarten children and their mothers living Seoul, Korea. Results indicated that children did not distinguish social-conventional situations from moral situations, but they clearly distinguished social-conventional and moral situations from personal situations. Mothers' reported that they would make indirect responses to children's behaviors in moral situations to highlight intrinsic consequences such as violating others' rights and happiness. In contrast, they said that they would make direct responses such as mentioning rules and manners in social-conventional situations. Mothers supported their children's choices in personal situations unless the situations were dangerous or detrimental to children's health.

  • PDF

Analysis on the Possibility of Electronic Surveillance Society in the Intelligence Information age

  • Chung, Choong-Sik
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.11-17
    • /
    • 2018
  • In the smart intelligence information society, there is a possibility that the social dysfunction such as the personal information protection issue and the risk to the electronic surveillance society may be highlighted. In this paper, we refer to various categories and classify electronic surveillance into audio surveillance, visual surveillance, location surveillance, biometric information surveillance, and data surveillance. In order to respond to new electronic surveillance in the intelligent information society, it requires a change of perception that is different from that of the past. This starts with the importance of digital privacy and results in the right to self-determination of personal information. Therefore, in order to preemptively respond to the dysfunctions that may arise in the intelligent information society, it is necessary to further raise the awareness of the civil society to protect information human rights.

Smart contract-based personal information management (스마트 컨트랙트 기반 개인정보 관리권한 연구)

  • Baek YeongTae;Min Youn A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.445-447
    • /
    • 2024
  • 스마트 디바이스 등 디지털 환경의 변화가 가속화되며 온라인을 통한 개인정보 관리에 대한 관심이 높아지고 있다. 개인정보를 다루는 플랫폼마다 다양한 개인정보 접속 가능자가 존재하며 블록체인 기반 스마트 컨트랙트를 이용하여 개인정보의 관리권한에 대한 유연한 관리 및 개인정보 관리 이력을 투명하게 관리할 수 있다. 본 논문을 통하여 블록체인 기술의 스마트 컨트랙트 기반 데이터 사용 및 관리권한에 대한 규칙을 설정하고 유연하게 수정하여 개인정보를 안전하고 투명하게 관리할 수 있다.

  • PDF

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

Improvement of Selective Consent Method in the Collection Process of Personal Information of Financial Institutions (금융기관의 개인정보 수집 절차 중 선택적 동의 방식의 개선방안)

  • Sun, Jong-chun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.123-134
    • /
    • 2020
  • Although the rights of data subjects are defined through laws such as the Personal Information Protection Act, the consent process for collecting personal information by financial institutions is only formal and does not guarantee the right of self-determination of personal information. Therefore, it is necessary to analyze the problem by information provision items of the current model, and to improve by changing the structure such as replacing the current method provided with the text with pictures and videos, and mandatory to provide the information subjects with personal information flow related images from the signing up stage. The improvement model is presented as a way to add a procedure to the current model. The effect was verified through a survey. It is hoped that the proposed model is actually reflected through the review to create an environment that can be a true meaning agreement that reflects the information subject's right to self-determination.

A Study of Effective Privacy Protection System on High Concurrent Transaction Database System (동시 트랜잭션이 많은 데이터베이스에서 효과적인 개인정보보호 시스템 연구)

  • Kang, Ji-Won
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.107-113
    • /
    • 2012
  • Recently, according to the establishment of personal information protection Act, the public and private organizations are taking a step to protect personal information rights and interests by employing the technical methods such as the access control mechanism, cryptography, etc. The result of the personal information leakage causes a serious damage for the organization image and also has to face with the responsibility by law. However, applying access control and cryptographic approach on the personal information item for every connection to large database system causes significant performance degradation in a large database system. In this paper, we designed and implemented the light weight system using JVM (Java Virtual Machine) for the Oracle DBMS environment which the concurrent transaction occurs many, thereby the proposed system provides the minimum impact on the system performance and meets the need of personal information protection. The proposed system was validated on the personal information protection system which sits on a 'A' public organization's portal site and personnel information management system.

COVID-19 Related Personal Information Issues and Countermeasures from the Perspective of Record Management (기록관리 관점에서 본 코로나 19 관련 개인정보 이슈와 대응방안)

  • Jeong, Ji-Hye;Na, Jeong-Ho;Jang, Ji-Hye;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.81-107
    • /
    • 2020
  • At a time when Korea and the rest of the world recently faced the unprecedented situation of "COVID-19," the view of actively "disclosure" of information to prevent the spread of infectious diseases is at odds with the view of "protecting" personal information as these social measures are coupled with the infringement of individuals' basic rights. In order to see the nation's response to the infectious disease crisis, we examined the current status and characteristics of public records according to crisis alert levels based on the manual for responding to infectious disease. Especially we analyzed the types and disclosure status of records containing personal information. For detecting personal information-related issues on news media, we collected online news articles and performed text anlaysis. Through this, we reviewed the problems of record management including personal information and suggested improvement points from the perspective of the life cycle of records: collect, manage, and dispose of them.

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

A Legal Analysis of Identity Revelation of Malicious Crime's Suspect (강력범죄 피의자의 신상공개에 대한 법적 고찰)

  • Jeong, Cheol-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.7
    • /
    • pp.156-168
    • /
    • 2012
  • As the increase of violent crimes such as robbery, murder, and rape has become a social problem, the government is considering institutionalizing the identification of criminals to prevent crime and to guarantee people's right to know. Such an atmosphere led to the approval of the revision of 'Special Law On the Punishment of Specific violent Crimes' in the National Assembly in April 2010. The revision allows the revelation of the profiles of crime suspects including the pictures of their faces at the investigation stage. However, whether the revision had been effective in preventing crime has not been demonstrated empirically. Moreover, identity revelation is a grave intrusion into privacy and an abuse of human rights such as personal rights and the right to a fair trial, since personal information of criminal suspects would be released to the media prior to the court's final judgements. Also it violates the principle of presumption of innocence, the principles of due process, the principle of double jeopardy, the principle of prohibition against excessive, the principles of clarity, and the principle of liability.