• Title/Summary/Keyword: private information protection

Search Result 253, Processing Time 0.037 seconds

Research a Study on Awareness and Practice of Personal Information Protection in Students (대학생들의 개인정보 보호인식과 실천에 대한 인지도 조사연구)

  • Lee, Hye-Seung;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.53-67
    • /
    • 2019
  • This study is expected to be of significance in that it attempted to examine the personal information protection awareness of college students and the state of their personal information protection as prospective information processors and private information owners to boost their will to put private information protection in practice. As a result of making an analysis, the most common average time that the students spent in doing every online activity on weekdays was fewer than two or three hours, and the most dominant activities that they did over the Internet were for entertainment or hobbies. As for awareness of the nature of the Internet, they looked upon it as a quite open public space. Regarding the state of private information protection, they thought that changing passwords on a regular basis would be beneficial to personal information protection, and many thought that it's needed to withdraw from or shut down web sites that weren't used for a long time. In terms of actual practice, however, they didn't change their e-mail passwords regularly on the grounds that it's a hassle, and even the students who had experience of personal information leakage didn't report it or didn't ask for counsel on the grounds that they didn't want to be bothered as well. The majority of the students weren't cognizant of how to report or seek counsel. In the future, personal information protection should be educated on a continual basis as part of curriculum to raise awareness of it among students and boost their will to practice it with a sense of responsibility in an effort to prevent the occurrence of collateral damages triggered by personal information leakage.

A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages (공·사립 유치원 홈페이지의 운영 및 개인정보 관리 실태 연구)

  • Kim, Jong Min;Chun, Hui Young;Choi, Eun A
    • Korean Journal of Child Studies
    • /
    • v.37 no.6
    • /
    • pp.119-132
    • /
    • 2016
  • Objective: The purpose of this study was to analyze the operation and personal information management of public and private kindergarten homepages. Methods: A total of 2,846 kindergartens were selected from the I-Sarang portal service for analyzing operation, and 217 self-operating homepages were selected for evaluating management. Seven evaluation items from three domains (information gathering procedures and scope, information security, and management of file exposure protection) were used. Wireshark and Google were used for analyzing some evaluation items. Results: The operating ratio of kindergarten homepages was low and most of the kindergartens self-operated their homepages. The evaluation of the information gathering procedures and scope showed that the rule of consent process was not rigidly followed but that the rule of legality for information gathering was followed. Items related to information security were followed at very low levels. As for the management of file exposure protection, the evaluation of items related to the prevention of attachment disclosure showed that the rule of protecting personal information included in an attached file was followed but that the notice regarding information protection was not. Across all evaluation items, the level of personal information management was higher in public (vs. private) kindergartens. Conclusion: These results indicate methods to more securely and effectively manage personal information on kindergarten homepages.

One Improved RLWE-based FHE and Fast Private Information Retrieval

  • Song, Wei-Tao;Hu, Bin;Zhao, Xiu-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6260-6276
    • /
    • 2019
  • With the rapid development of cloud computing, it raises real questions on privacy protection, which greatly limits the use of cloud computing. However, fully homomorphic encryption (FHE) can make cloud computing consistent with privacy. In this paper, we propose a simpler FHE scheme based on ring LWE problem, with a smaller size of ciphertext and a lower noise-expansion factor for homomorphic multiplication. Then based on our optimized RLWE-based FHE scheme, we propose a fast single-database private information retrieval protocol, combining with batching and number theoretic transform technology.

The Suggestion for Improvement of the Education System of Private Security Employees (민간경비원 교육과정의 문제점과 개선방안)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.13-21
    • /
    • 2012
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection/use of privacy data, processing of sensitive information/personal ID information, and encryption of privacy information); restrictions on installation/operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study.

A Study on Pattern Extraction and Complete Elimination Method of Private Information (개인정보의 패턴 추출과 완전삭제방법에 관한 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.143-146
    • /
    • 2012
  • Enforcement of private information preservation law the infringement accident which is still caused by despite with private information outflow occurs. The private information outflow avoids finance and to become the fire tube. Analyzes the pattern of private information from search of private information and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private information which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private information protection and it did the pattern extraction and a complete elimination experiment of private information.

  • PDF

Analysis of problems caused by Big Data's private information handling (빅데이터 개인정보 취급에 따른 문제점 분석)

  • Choi, Hee Sik;Cho, Yang Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2014
  • Recently, spread of Smartphones caused activation of mobile services, because of that Big Data such as clouding service able to proceed with large amount of data which are hard to collect, save, search and analyze. Many companies collected variety of private and personal information without users' agreement for their business strategy and marketing. This situation raised social issues. As companies use Big Data, numbers of damage cases are growing. In this Thesis, when Big Data process, methods of analyze and research of data are very important. This thesis will suggest that choices of security levels and algorithms are important for security of private informations. To use Big Data, it has to encrypt the personal data to emphasize the importance of security level and selection of algorithm. Thesis will also suggest that research of utilization of Big Data and protection of private informations and making guidelines for users are require for security of private information and activation of Big Data industries.

A Study on the Influencing Factors of Continuous Usage Intention for a Scenario based FAQ Service regarding on Private Information Protection (개인정보보호에 관한 시나리오 기반 질의응답서비스 품질이 이용의도에 미치는 요인에 관한 연구)

  • Kang, Sang-Ug;Lee, Dae-Chul
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.223-236
    • /
    • 2014
  • The paper studies the influencing factors of continuous usage intention for a scenario based cognitive FAQ service regrading on private information protection. The research result finds that three major factors are significantly positive to the continuous usage intention for the service. First, search easiness is an essential factor and it can be improved using sophisticate categorization. Second, Scenario based FAQ service is effective on understanding and solving questioner's situation. Related information is helpful for problem solving. The research shows that the new approach to private information protection area can lead to a more acceptable and reasonable problem solving tool.

Comparative Study on Knowledge Protection in Public and Private Organizations (정부조직의 지식보호 - 민간기업과의 비교를 중심으로 -)

  • Lee, Hyangsoo
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.78-101
    • /
    • 2010
  • Unlike knowledge sharing or knowledge transfer, knowledge protection has received little attention in the literature. Knowledge protection play a very important role in keeping organization competitive. This study explores the differences in knowledge protection between public and private organizations by T-test and regression analysis. The results of this study shows that the level of knowledge protection in public organizations is lower than that in private organizations. There is even larger difference in the level of access to key knowledge from outside between the two sectors. Such difference can be explained by the unique characteristics of public sector organizations. Understanding why the level of knowledge protection differs between the public and private sector is very important. This study presents lessons and implications for management leadership.

  • PDF

A Study for Protecting the Virtual Memory of Applications (어플리케이션의 가상 메모리 보호를 위한 연구)

  • Kim, Dong-Ryul;Moon, Jong-sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.6
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.

Improvement Proposals for Biometric Information Protection Guideline based on the Analysis of Global Bio Information Privacy Issues (글로벌 바이오정보 프라이버시 논점 분석을 기반으로 한 바이오정보 보호 가이드라인 개선 방안)

  • Jung, Boo-geum;Kwon, Hun-yeong;Park, Hea-sook;Lim, Jong-in
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.87-94
    • /
    • 2018
  • Privacy means the right not to interfere with the private life of an individual. Bio data is the most private personal information about the person itself, and according to advancement of technology, it is possible to analyze and judge individual as well as identify individual. The Personal Information Protection Act is based on global privacy principles, but the legislation for the protection of bio information has yet to be enacted. Therefore, it is time to protect biometric data as more sensitive information than general personal information. We will review the global privacy discussions for protecting biometric information and propose additional privacy principles and measures for utilization that should be defined in the biometric information protection guideline.

  • PDF