• Title/Summary/Keyword: privacy rights

Search Result 123, Processing Time 0.021 seconds

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

Exploring Considerations for Developing Metaverse Ethical Guidelines

  • HoSung WOO;Yong KIM
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.2
    • /
    • pp.1-5
    • /
    • 2023
  • Purpose: There are already hundreds of millions of users of the Metaverse platform, and within a few years, it is expected to develop into a stage for new economic activities with huge industrial ripple effects due to the size of users. The purpose of this study is to derive considerations for the development of metaverse ethical guidelines. Research design, data, and methodology: The concept of the metaverse was examined through various opinions of industry and experts on the metaverse, and literature related to metaverse ethics was analyzed in the Korean journal database. Results: Six issues were identified through the existing research. (1) Establishing a unified definition of metaverse (2) Necessity of establishing ethical principles considering the operator (3) Personal information protection and privacy (4) Expression in a virtual environment (5) Copyright and intellectual property rights of creations (6) Virtual economy and fairness of trade. Conclusions: Metaverse ethics will be developed and implemented in a form and method different from the real world, but basically, continuous discussions on ethical rationality are needed in the process. In addition, since the ethical judgment in the metaverse environment accompanies cultural differences and epochal changes, it is necessary to focus on metaverse ethics cases.

The Customer Satisfaction Index Model: An Empirical Study of the Private Healthcare Sector in Malaysia

  • ARIFFIN, Ahmad Azmi M.;ZAIN, Norhayati M.;MENON, Bama V.V.;AZIZ, Norzalita A.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.1
    • /
    • pp.93-103
    • /
    • 2022
  • The main purpose of this study was to gauge the patient satisfaction index and subsequently discuss the Importance-Performance (IP) matrix analysis of the inpatient services in the context of the private hospital setting. The Malaysian Customer Satisfaction Index Model was employed as the theoretical framework for the above purposes. This study involving 242 patients in Malaysian's private healthcare sector used a Web-based survey as the main method of data collection. Partial least square structural equation modeling (PLS-SEM) was utilized for data analysis. Using Fornell et al. (1996)'s formula, the resulting patient satisfaction index was slightly lower than the "very satisfied" category, the target level required for positioning as one of the world's premier medical tourism players. The IP matrix showed that medical quality is the main competitive advantage of the private hospitals that can propel their growth in the global healthcare marketplace. The results also indicate that outcome quality, patient rights, and privacy, and service quality are the three quality domains that need to be prioritized for further improvement. On the other hand, the servicescape quality domain needs to be strategized as the unique selling proposition as the performance of the private hospitals in this regard is already extremely good.

A Study on the Freedom of the Press and the Remedy for Defamation (언론의 자유와 명예훼손 구제방법에 관한 연구)

  • Jeon, Chan-Hui;Ji, Yong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.159-168
    • /
    • 2012
  • Freedom of speech is indispensable in Democracy. It is a rink among government agencies. Mass media as institutionalized means which forms public opinion impacts quite a few to a society. Mass media as a life media in our daily lives has characteristics of speed and prompt report. It is difficult to measure the effect on a society. Mass media is a lifeline in democracy because it has freedom of opinion for seeing, listening, speaking, and criticizing about the people's right to know in an information society. Our Constitution also guarantees freedom of the press, information(peoples's right to know), report, the collection of news, and edition. Because an unnecessary thing about a privacy is reported by mass media, it can violate defamation. This study seeks to be unbiased in reporting and what the principles of the Constitution for minimizing an invasion of a person's privacy is. This study also seeks freedom of speech and the right to know. In case that a personal honor is invaded by a mass media and a publication, this study provides the Constitution basis, Criminal Law basis, and Civic Law basis for remedy violation. A report for apology on newspaper and by television was widely used as "a proper punishment for honor recovery in the past". The constitutional court had decided that including the report of apology for "a proper punishment of honor recovery" in the article 764 of the Civic Law as a reason of freedom of conscience and the violation of personal rights was against the Constitution. Therefore, this study examples what is a legal remedy in practical?, where is legal basis of special remedy in the Civic Law, and what is a method by the Press Arbitration Law compared with the examples of other countries. On the other hand, because a mass media may injure a person's honor and infringe a person's privacy, if the report is categorized as a malicious press, the true role which mass media has to do may not demonstrated. In conclusion, this study was to minimalize infringement of mass media to a person and to seek a realistic alternative of a legal remedy.

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

Overview of Personal Information Protection Act in Korea (개인정보보호법의 개관 및 개정방향에 관한 연구)

  • Kim, Ilhwan;Sung, Jaeho
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.141-148
    • /
    • 2015
  • The Personal Information Protection Act enacted in March 2011 stated that the application target of this law includes all personal information processors in the public and private sector, and established the protection standard by phase such as collection, use and provision of personal information. There was an introduction of the Privacy Impact Assessment system that enables personal information processors to perform impact assessment autonomously if there are great concerns over the fact that making and expanding personal information files will influence the protection of personal information, while also making impact assessment compulsory for public institutions in specific reasons with great concerns for violating the rights of the subjects of information. This Act still has the problem that it is generally difficult to understand. This paper deals with the Korean legal practices about the personal information protection with regard to ambiguity and promotional system.

Understanding Big Data and Utilizing its Analysis into Library and Information Services (빅데이터의 이해와 도서관 정보서비스에의 활용)

  • Lee, Jeong-Mee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.4
    • /
    • pp.53-73
    • /
    • 2013
  • This study revisits issues for Big data. Three research questions, understanding the concept of Big data, important issues of Big data research and utilization methods for library information services, are explored by the literature and practice reviews. Study results revealed several important issues of Big data including the concept in the context of real world situation, the problems with the accuracy and reliability of the data, privacy and ethical issues, and issues of intellectual property rights. With understanding these issues, a few utilization methods were introduced for Library and Information services. It was included using its analysis for developing vision, adopting Library management, supporting community services, and providing customized information services for various users. The study concluded Big data analysis would effectively provide valid evidences for all those services.

The Volume and the Quality of Media Visibility according to the Hierarchy of Offender and the Victim (가해자와 피해자의 위계(hierarchy)에 따른 매체가시성(media visibility)의 양과 질 네트워크 분석)

  • Hong, Ju-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.520-534
    • /
    • 2017
  • A sex offense report highlights the victim as well as the offender involved in the sex crime. This study explored the hierarchy between the offender and the victim, based on the frequency analysis and network analysis. In case that the perpetrator is a celebrity, the media focuses more on the celebrity's actions. The volume of reports for cases where the offender has a position superior to the victim's (offender superior relationship) is larger than for those where the two have a horizontal relationship. The press highlights the celebrity in offender superior relationships and the victim in horizontal relationships. The celebrity is held responsible for the cause of the crime in the offender superior relationship. However, the victim him/herself is held responsible for the perpetrated offense in horizontal relationships. According to the results of the analyses in this study, the press fails to protect human rights and privacy in offender superior relationships.

A New Model for Codes of Ethics for Librarians of South Korea (한국의 사서직 윤리규정 방향 제안)

  • Kim, Hae-Kyoung;Nam, Tae-Woo
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.329-352
    • /
    • 2004
  • In this knowledge-based society of this age, librarianship takes a professional position and requires essential principles of ethics that has to be observed. Therefore, library associations and professional communities all over the world have released criteria and code of ethics to make their professional positions to keep. This research investigated and analyzed the codes of ethics for librarians in United States, Great Britain, Japan, and South Korea which are based on the mission of each library of each country. Based on these analysis and comparison, this research proposed more advanced codes of ethics for South Korea. The proposed model of codes of ethics consists of two parts: ethics for information and ethics for professional positions. The ethics for information contains six essential elements: equal access and services for information, denial of inspection, protection of privacy, neutralization of librarian, and security of intellectual freedom. The ethics for professional positions consists of 8 essential aspects: exclusion of personal benefit, continuous efforts for developing knowledge, keep the professional position, conflicts between professional task and organization, relationship with co-workers, ensure the conditions of rights and welfare for employees, cooperations among libraries, and contribution for creation of new culture.