• Title/Summary/Keyword: private information protection

검색결과 253건 처리시간 0.029초

조선전기(朝鮮前期) 호위제도(護衛制度)에 관(關)한 고찰(考察) (Consideration on Royal Guards of Early Chosun Dynasty)

  • 송상욱;권정훈
    • 한국재난정보학회 논문집
    • /
    • 제6권2호
    • /
    • pp.67-85
    • /
    • 2010
  • The purpose of this consideration is to present fundamental data for understanding and development the historical approach of Korea Protection by re-examining Royal guarding system through the history in Early Chosun Dynasty. This paper initiated from this critical mind seeking to understand the changing phase of Korea Guarding system, and fundamentally to find the future-oriented ways for the Guarding system. The main materials of history in Early Chosun Dynasty were re-examined, investigated and analyzed and the main references are a code of laws and official as well as private documents such as Kukjo-Oreyeui. Guards system for Royal prince has been found in Byung-jeon of Kyungguk-daejon. he Guards organization has dual system, one was Gumgun which was a private military man and the other was Wuibyung which was a Central military man. On the contrary, central military man were normally protected the royale palaces, but when the King come and go they accompanied and protected the King in safety zone. But just in case they did a job as a member of capital protection military affairs. A question of finance was the reason why there had been dual protection system due to financial matter. If it increased number of man it would pay much money, therefore central military man who has no relevance to national finance were supplied as members of military affairs for the protection of king.

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

임상실습 경험 간호학생의 환자 개인정보보호 인식과 실천에 대한 융합적 연구 (Convergence Study on Perception and Performance of Patient Private Information Protection in Nursing Students with Clinical Practice)

  • 이현정
    • 문화기술의 융합
    • /
    • 제4권2호
    • /
    • pp.53-60
    • /
    • 2018
  • 본 연구는 18주간 임상실습을 경험한 간호학생들의 환자 개인정보보호 인식과 실천 정도를 확인하여 정보보호에 대한 관심을 불러일으키고 간호학생들을 위한 환자 개인정보보호 교육 프로그램 마련에 필요한 기반 자료를 제공하고자 시도되었다. 간호학과 4학년 학생 76명을 대상으로 조사한 결과, 환자 개인정보보호 인식 정도(4.62점/5점)가 실천 정도(3.84점/5점)에 비해 통계적으로 유의하게 높았다. 인식 정도와 실천 정도는 통계적으로 유의한 순상관관계가 있었다. 향후 일부 간호학생으로 제한되었던 대상자를 확대하여 간호학생의 환자 개인정보보호 인식과 실천에 영향을 주는 요인을 파악하기 위한 다학제간 융합연구가 필요하고, 간호학생들을 위한 환자 개인정보보호 교육 프로그램 개발과 적용이 필요하며. 환자 개인정보보호 인식과 실천을 향상시키기 위한 의료기관과 대학 측의 공동 방안 모색이 필요하다.

개인정보보호정책에 관한 연구동향 고찰: KCI등재지를 중심으로 (An Study on Privacy Policy Research Trend: Focused on KCI Published)

  • 복준영
    • 디지털융복합연구
    • /
    • 제18권4호
    • /
    • pp.81-89
    • /
    • 2020
  • 본 2011년 개인정보보호에 관한 법률이 시행된 이후 지금까지 다양한 학문분야에서 개인정보보호정책에 관한 연구가 이루어져왔다. 2020년 1월 데이터 3법의 법제화로 인해 개인정보보호정책에 관한 지난 연구동향을 살펴보는 것은 새로운 연구방향을 탐색하는데 의미가 있을 것이다. 이에 본 연구는 2011년부터 2019년까지 KCI에 등재된 146편을 연구주제, 연구성격, 연구방법 등의 분류유목을 기준으로 분석하여 새로운 연구방향을 모색하고자 하였다. 결과적으로 개인정보보호정책에 관하여 해외 사례비교 연구 및 금융과 핀테크 분야에서의 개인정보보호정책을 다룬 비중이 높았으며, 기술적으로 보안과 해킹문제를 해결하려는 연구도 빈번하게 이루어졌다. 또한 형사적 대안으로 규제 정책을 강화시키는 연구도 활발하였으나 대부분은 규제강화에 중심을 두어 향후 연구에서는 산업적 측면에서의 안전한 개인정보 활용에 대한 논의가 더욱 활성화될 필요가 있다. 또한 개인정보 활용에 앞서 무분별한 사용을 방지하기 위한 개인정보 활용에 관한 사회적 합의가 절실히 필요하다고 하겠다.

보존연한 도래 및 법적기준 준수를 위한 개인정보 정책적 폐기시스템을 활용한 폐기 누적현황 데이터베이스 구축에 관한 방안 제안 (A Proposal of Methods for Building Databases about the Accumulation of Disuse Utilizing the Political System to Discard Private Information According to the Expiration of In-service Life and Observation of Legal Standards)

  • 서우석
    • 디지털산업정보학회논문지
    • /
    • 제14권3호
    • /
    • pp.45-53
    • /
    • 2018
  • The Personal Information Protection Act has been revised continuously since its establishment, and as a way to secure stability properly, the guidelines as well as enforcement ordinances and regulations have been changed, too. It seems that people's recognition and awareness of private information have already evolved to a certain level that is regarded to be fairly high. However, no one can exactly imagine how much ripple effect scrapping discarded paper regarded simply as waste material which is often and easily practiced in our everyday lives exerts and how many socially significant events it may arouse in our lives. Private information is produced, operated, preserved, utilized, distributed within the frame of law unidentified, and then discarded with a particular purpose. While going through a series of processes, each piece of that private information comes to be reproduced melting a lot of information. It is used and also changed beneficially sometimes to richen our lives or as basic material for welfare. Meanwhile, its importance is decided by its weight or mass and then often gets discarded after all. It means that the process of disuse is being done in a way to arouse the possibility of invasion of personal rights and also the second and third and also more exposure of private information. Therefore, approaching the meaning of automation politically, this study aims to suggest how to secure stability in the process of discarding private information in terms of logical automation.

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • 제40권6호
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.

"클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안 (Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users)

  • 이정구;민대환;권헌영
    • Journal of Information Technology Applications and Management
    • /
    • 제24권1호
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.

APEC 국가의 전자상거래 소비자보호 현황과 개선방안 (International Conference of Consumer Protection Issues on B2C in APEC)

  • 전의천;김장호;김석민
    • 통상정보연구
    • /
    • 제4권2호
    • /
    • pp.27-46
    • /
    • 2002
  • Nowadays, the explosive evolvement of Internet. which is referred to as EC, has been prevailing. That has given the chance all of the world consumers to contact all of the world companies to enter into business relationship. But, electronic commerce laws have been established per conventional jurisdiction. some legal issues take place in the field of cross-border electronic commerce, including the governing law and competent courts. In this situations, it is gradually and widely required to lay down the internationally harmonized electronic commerce legal framework. Now, there are a lot of legal issues assumed in EC, in this study, we studied three precedence problems concerning B2C: Consumer Protection Law regarding B2C, Personal Information Protection Law in Private Sector regarding B2C, Web Site Trust Mark System.

  • PDF

A Study on the Protection of Biometric Information against Facial Recognition Technology

  • Min Woo Kim;Il Hwan Kim;Jaehyoun Kim;Jeong Ha Oh;Jinsook Chang;Sangdon Park
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권8호
    • /
    • pp.2124-2139
    • /
    • 2023
  • In this article, the authors focus on the use of smart CCTV, a combnation of biometric recognition technology and AI algorithms. In fact, the advancements in relevant technologies brought a significant increase in the use of biometric information - fingerprint, retina, iris or facial recognition - across diverse sectors. Both the public and private sectors, with the developments of biometric technology, widely adopt and use an individual's biometric information for different reasons. For instance, smartphone users highly count on biometric technolgies for the purpose of security. Public and private orgazanitions control an access to confidential information-controlling facilities with biometric technology. Biometric infomration is known to be unique and immutable in the course of one's life. Given the uniquness and immutability, it turned out to be as reliable means for the purpose of authentication and verification. However, the use of biometric information comes with cost, posing a privacy issue. Once it is leaked, there is little chance to recover damages resulting from unauthorized uses. The governments across the country fully understand the threat to privacy rights with the use of biometric information and AI. The EU and the United States amended their data protection laws to regulate it. South Korea aligned with them. Yet, the authors point out that Korean data aprotection law still requires more improvements to minimize a concern over privacy rights arising from the wide use of biometric information. In particular, the authors stress that it is necessary to amend Section (2) of Article 23 of PIPA to reflect the concern by changing the basis for permitting the processing of sensitive information from 'the Statutes' to 'the Acts'.

정보보호 전문 인력 양성을 위한 교육과정 모델에 관한 연구 (A study on a curriculum for information protection specialty manpower training)

  • 이문구
    • 한국컴퓨터산업학회논문지
    • /
    • 제5권8호
    • /
    • pp.811-818
    • /
    • 2004
  • 인터넷의 보급과, 산업 및 생활 전반에 걸쳐 전산화가 이루어지면서 사생활 보호 및 정보보호에 대한 요구가 증가하고 있지만 정보보호 산업분야의 전문 인력의 부족으로 많은 어려움이 있다. 때문에 본 논문에서는 정보보호 전문 인력 양성을 위한 교육과정을 제안하였다. 제안하는 교육과정은 필수 1,2 와 선택 1,2로 분류하였다. 정보보호 응용분야를 9개의 도메인으로 세분화 하여 시행되어야 할 교육과정을 링 구조로 제시하였다. 정보보호 응용분야의 9개 도메인에 따른 현장 실무 프로젝트와 연계된 교육 과정과 졸업 후 전공심화를 위한 강좌가 도메인별로 이루어져서 정보보호 심화과정을 지속적으로 진행한다.

  • PDF