• Title/Summary/Keyword: privacy infringement

Search Result 126, Processing Time 0.025 seconds

A Study on the Market Status and Issues of e-Commerce Insurance (전자상거래 보험의 시장현황 및 쟁점에 관한 고찰)

  • Shin, Gun-Hoon
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

Causes and Effects of Conflict Arising from Public Pedestrian Passages in an Apartment Complex - Based on a Survey of Residents living in an Apartment Complex - (공동주택 단지 내 공공보행통로의 갈등 요인과 영향 - 공동주택 거주민의 인식조사를 바탕으로 -)

  • Lee, Seung-Ji
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.12
    • /
    • pp.95-102
    • /
    • 2018
  • The purpose of this study is to investigate the causes of conflict that arise from public pedestrian passages installed in apartment complexes through a survey of residents' perceptions and to investigate the effects on the satisfaction with and necessity of the public pedestrian passage. This has significance as a preliminary research into determining solutions to conflict related to public pedestrian passages that are open spaces, accessible 24 hours a day to pedestrians including people who live outside of the apartment complex. The result of the residents' perception survey showed that there is conflict due to the public pedestrian passage. The main problem was the noise-related variables. While management and safety variables were also perceived as problems, privacy and ownership infringement variables were not. These problems were reduced to four factors through a factor analysis: unfavorable incidents, environment management, ownership infringement, and safety crimes. Analyzing the effects of the above factors on the satisfaction with the apartment complex, satisfaction with the public pedestrian passage and the necessity of the public pedestrian passage, demonstrated that the unfavorable incidents factor influenced all the variables. The safety crimes factor, which is an extended concept of the unfavorable incidents, affected both the satisfaction and necessity of the public pedestrian passage. The ownership infringement factor was found to affect the satisfaction of the public pedestrian passage only, and the environment management factor did not affect all the variables. In planning and managing public pedestrian passages, avoiding incidents and crimes should be considered as a priority to increase the satisfaction of residents and solve conflicts.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

A study on UI/UX Navigating Method for Effective Privacy Guidance for Online Behavioral Advertising(OBA) (온라인 맞춤형 광고 안내에 대한 프라이버시 안내를 위한 UI/UX 제공 방안 연구)

  • Kim, Ga-Yun;Kim, Ho-Joon;Kim, Da-Yeong;Yang, Jin-Hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.175-183
    • /
    • 2021
  • As concerns about users' privacy infringement on Online Behavioral Advertising(OBA) increase, regulators are taking measures such as drawing up guidelines for OBAs, and websites provide OBA guidance in compliance with such guidelines. As a result of reviewing the status of providing OBA guidance on websites, access to OBA guidance pages was rather complicated. In order to analyze the issue from the UI/UX perspective, following the "Guidelines for Privacy in Online Behavioral Advertising" applied to all types of OBA transmitted on websites, this study aims to structuralize a navigation of page movement from two starting points, 1) Main Page, 2) The page where OBA is delivered, to OBA guidance pages. Also, with understanding the problems found in the access and navigation of OBA guidance pages by analyzing features found during the page navigation, such as hyperlinks containing keywords, and movement pages.

Face Information Conversion Mechanism to Prevent Privacy Infringement (프라이버시 침해 방지를 위한 얼굴 정보 변환 메커니즘)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.6
    • /
    • pp.115-122
    • /
    • 2019
  • CCTV(Closed-Circuit Television) is increasingly exposed to CCTV per person as the number of installations increases every year for accident prevention and facility safety. The intelligent video surveillance system technology is attracting attention to the privacy protection of exposed subjects. The intelligent video surveillance system performs a process for the privacy protection so as to perform the action type of the subject and the judgment of the situation in the simple identification of the photographed image data, or to prevent the information, from which the information of the photographed subject is exposed. The proposed technique is applied to the video surveillance system and converts the original image information taken from the video surveillance system into similar image information so that the original image information is not leaked to the outside. In this paper, we propose an image conversion mechanism that inserts a virtual face image that approximates a preset similarity.

A Comparative Analysis between High and Low Groups on Concerns About Privacy Infringement in Consumer Innovation Patterns According to Internet Media Activities (인터넷 미디어 활동에 따른 소비자 혁신성 유형이 프라이버시 침해 우려성에 대한 고(High)집단과 저(Low)집단 간의 비교 분석)

  • Lee, Ji-Hun;Kang, Jun-Mo;Lee, Jeong-Suk
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.7
    • /
    • pp.193-202
    • /
    • 2020
  • This study was intended to present the magnitude of privacy infringement concerns and their relationship to consumer innovation (functional innovation, hedonistic innovation, social innovation, cognitive innovation), to identify differences among groups and to suggest implications for marketing strategies for the spread of new products. The implications of this study are as follows. First, functional innovation has shown that differences exist between groups. Analysts say that sensitive groups are buying products that can simplify their work immediately after release despite concerns over privacy violations. Second, hedonistic innovation has shown that differences exist between groups. These findings suggest that sensitive groups prefer novel products, products that give excitement and excitement about products, and products that give new enjoyment and fun that they have never known before. Third, social innovation has been shown that there is no difference between groups. These analyses show that the self-esteem of using products that others have never experienced before, and the curiosity that anyone envies, are purchased or used first. Finally, cognitive innovation showed that differences existed between groups. These analyses show that new products are purchased when they meet the functions, design, and innovation that consumers want.

Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID (랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜)

  • Li Yong-Zhen;Mun Hyung-Jin;Jeong Yoon-Su;Lee Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.755-761
    • /
    • 2006
  • Previous RFID technique, it is recognizable without the physical contact between the reader and the tag, causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. Especially the information security problem of read only tag is solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which is adopted to read-only tag and secure to several attacks using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

E-government, Big Brother, Information Capitalism - Focusing on the NEIS Problem (전자정부, 빅 브라더, 정보자본주의 - 네이스 문제를 중심으로 -)

  • Hong Seong-Tae
    • Journal of Science and Technology Studies
    • /
    • v.4 no.1 s.7
    • /
    • pp.31-57
    • /
    • 2004
  • Controversies over NEIS(Network of Education Information System) began with very deep concern about infringement of human rights stemming from NEIS. A large information system which accumulates and uses huge size of individual information is always able to deeply infringe on human rights. But the ministry of education would not do the best not to be 'Big Brother' being dazzled by instrumental efficiency of information technology. NEIS has demonstrated problems of the information policy of Korea strongly driven in the name of 'E-goverment'. It has very strong characteristic of the statist economic growth policy focusing on more economic possibility than other. In this situation, making money is easily considered more important than protecting human rights. Information capitalism is nurtured at the sacrifice of human rights. So, we have to face problems of 'E-goverment' in order to correct the NEIS problem, The most important task to correct the NEIS problem is to make an element law protecting privacy and to establish an independent national institute protecting privacy

  • PDF