• Title/Summary/Keyword: privacy rights

Search Result 123, Processing Time 0.02 seconds

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

Web Services-Adaptable Privacy-Aware Digital Rights Management Architecture (웹서비스 환경에서의 프라이버시를 보호하는 디지털 저작권 관리 아키텍쳐)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.53-81
    • /
    • 2005
  • Current DRM system has limitation in protection of user's privacy Therefore, many troubles are expected in service providing if it comes into the ubiquitous times of context-aware environment. HKUST Proposed a watermark-based web service DRM system. However, the relevant study does not consider ubiquitous environment and cannot provide service that considered a context. And privacy protection of a user is impossible. On the other hand, Netherlands Phillips laboratory indicated a privacy problem of a DRM system and they proposed an alternative method about this. However, in relevant study, a Sniffing/Replay attack is possible if communicated authentication information are exposed between a user and device. We designed web services adaptable privacy-aware DRM architecture which supplements these disadvantages. Our architecture can secure user authentication mechanism for sniffing/Replay attack and keep anonymity and protect privacy Therefore , we can implement the privacy-aware considered web service DRM system in Context-Aware environment.

  • PDF

A Study on the Sensitivity of Human Rights and the Advocacy Activities of Korean Occupational Therapists (국내 작업치료사의 인권감수성이 옹호활동에 미치는 영향)

  • Kim, Ji-Man;Hong, Ki-Hoon;Lee, Chun-Yeop;Kim, Hee-Jung
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.10 no.2
    • /
    • pp.11-24
    • /
    • 2020
  • Objective : The Human Rights constitute one of the basic pillars of every work where persons are involved, such is the case of the occupational therapy field. Methods : In this study we investigate the human rights sensitivity and the advocacy activities of occupational therapists. The differences according to their characteristics, the relationship and the impact of the human rights sensitivity are examined and presented. Making use of online surveys 116 subjects participated in the study. Results : The measured average of human right sensitivity is 69.00 ± 17.67 point, being them distributed according to the following subcategories: to the perception of the situation corresponds 23.25±5.62 points, to the perception of the consequences 22.75±6.54 points and for the perception of the responsibility 23±6.54 points. In all the cases have been taken in account the equal rights, the right to education in disables, the right to pursue the happiness of the elderly, the right of the disables to have personal freedom, the privacy rights and the privacy rights for mental illness people. According to the working area the Human Right sensitiveness is higher in Seoul than in the Gyeongsang province meanwhile the advocacy activities is higher in Seoul and in Gyeonggi province than in Gyeongsang province. Depending of the type of service, general hospitals and rehabilitation/nursing hospitals showed higher human rights sensitivity than other service organizations According to the working field, occupational therapy group focused in elderly showed higher Human Right sensitivity than other fields. Professionals belonging groups of clinical experience from 3 to 5 years and from 6 to 10 years showed higher advocacy activities than professionals with more than 11 years of experience. A positive correlation was showed between the human rights sensitivity and the advocacy activities. For this situation, the human rights sensitiveness was divided in sub-categories in perception of the situation, perception of the consequences and perception of the responsibility. As showed by the result of multiple regression analyses the advocacy activities of human would grow up in accordance with the increase of the human rights sensitiveness of responsibility perception. Conclusion : Due to the actual lack of information, the collection and study of basic data is fundamental for the development of practical human rights educational programs and to emphasize the role of the defense of the human rights.

A Review of Research Trends in Human Rights to Information in Contemporary Korean Jurisprudence (현대 법학계의 정보인권 연구동향)

  • Myung, Jae-Jin;Lee, Han-Tae
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.3-23
    • /
    • 2011
  • With the advent of the information era, the need to protect private information has increased rapidly. Theoretical answers to this problem in jurisprudence has been pursued in various ways over the last two decades. The purpose of this study is to find the types of human rights to information and provide directions for future studies by analyzing existing research materials. About 200 materials, including theses and dissertations produced from 1988 to the present have been collected and analysed. Lessons and implications for this study for the systematization of information rights are presented. I hope this study will contribute to future studies about information rights in jurisprudence.

  • PDF

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

A Study on the Issues on Moral Rights of Oral History Resource (구술자료의 인격적인 권리에 관한 연구)

  • Lee, Ho-Sin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.12 no.3
    • /
    • pp.47-69
    • /
    • 2012
  • There are so many personal experiences and innermost feelings in oral history resource. Thus, when we use the oral history resource, it has a lot of the possibility to arise ethical and legal issues. To prevent the problems and to protect interviewee, it is needed to comply the guideline for ethical and legal issues through the oral history project. The ethical issues are applied to every step of the project. The most important principle for ethical issues are the mind to protect the dignity of interviewee. The moral right is classified the right of privacy and defamation issues. The right of privacy is basic human rights to guard for the freedom of the individual. The defamation is defined as a false statement of the fact about a person which tend to injure that person's interest.

Privacy Policy Analysis Techniques Using Deep Learning (딥러닝을 활용한 개인정보 처리방침 분석 기법 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.305-312
    • /
    • 2020
  • The Privacy Act stipulates that the privacy policy document, which is a privacy statement, should be disclosed in order to guarantee the rights of the information subjects, and the Fair Trade Commission considers the privacy policy as a condition and conducts an unfair review of the terms and conditions under the Terms and Conditions Control Act. However, the information subjects tend not to read personal information because it is complicated and difficult to understand. Simple and legible information processing policies will increase the probability of participating in online transactions, contributing to the increase in corporate sales and resolving the problem of information asymmetry between operators and information entities. In this study, complex personal information processing policies are analyzed using deep learning, and models are presented for acquiring simplified personal information processing policies that are highly readable by the information subjects. To present the model, the personal information processing policies of 258 domestic companies were established as data sets and analyzed using deep learning technology.

Human Rights Sensitivity of University Varsity Teams (대학운동부의 인권감수성)

  • Kim, Eon-Hye;Chang, Ik-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.8
    • /
    • pp.427-436
    • /
    • 2020
  • This study aims to understand human rights sensibility in university varsity teams and to compare and analyze differences in human rights sensibility by variables related to university varsity teams. In order to achieve the purpose of this study, 188 student-athletes from 10 universities were selected. The collected data were analyzed in descriptive analysis, reliability analysis, one-way ANOVA, Scheffe using IBM SPSS 24.0. First, based on the episodes, the episodes with the highest human rights sensitivity are the right to labor of migrant workers and happiness rights, and the episodes with the lowest human rights sensitivity are the right to freedom of detention and privacy rights. In addition, among the sub-factors of human rights sensitivity, perception of responsibility and perception of behavior are higher than perception of outcome. Second, there are differences in the human rights sensitivity of the university varsity team depending on the size and the level of performance of the university varsity team. Third, there are differences in the human rights sensibility of the university varsity team depending on the educational characteristics (volunteer activity and human rights education) of the university varsity team.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.