• Title/Summary/Keyword: private information protection

Search Result 257, Processing Time 0.026 seconds

Survey for the Police Service about Mass Rally (다중운집행사의 안전 확보를 위한 경찰개입 인식조사)

  • Kim, Sangwoon;Shin, Jaehun
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.139-146
    • /
    • 2017
  • This research verified that how citizen feel about police protection for the mass rally and how they trust about police and private security. Mass rally is lots of people gathering therefore, each of member could feel fear for their safe. And that kind fear has effect on success of rally Therefore we researched that security level by police and private security and the result is that most of people think that the charge of security is police and they think police member need to be more for their security. And police should be involved for the rally security. But they don't think for the private security.

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

A Design of Cloaking Region using Dummy for Privacy Information Protection on Location-Based Services (위치기반서비스의 개인정보보호를 위해 Dummy를 이용한 Cloaking 영역 설계)

  • Kim, Ju-Yung;Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.929-938
    • /
    • 2011
  • The setting algorithm of cloaking region using dummy which is proposed in this paper solves the problem which counts the building with duplication that exists in several cells of Privacy Grid by adding the building grouping item to the index structure of the existing Privacy Grid, and by increasing K value after searching the contiguous cells in the comer of each building, the exposure problem of private location information due to the minimum cloaking region setting of the existing GBC is solved. In addition, this paper reduces the searching time of K value by setting smaller cloaking region than Privacy Grid and GBC with dummy K before expanding cloaking region and strengthens the location information protection of users using dummy K.

Privacy Leakage Monitoring System Design for Privacy Protection (개인정보보호를 위한 개인정보 유출 모니터링 시스템의 설계)

  • Cho, Sung-Kyu;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.99-106
    • /
    • 2012
  • Numerous private corporations and public institutions are collecting personal information through the diverse methods for the purpose of sales, promotion and civil services, and using personal information for the profits of the organizations and services. However, due to immaturity of the technical, managerial measures and internal control for the collected personal information, the misuse, abuse and the leaks of personal information are emerged as major social issues, and the government also is promoting implementation of the act on the privacy protection by recognizing the importance of the personal information protection. This research describes on the measures to detect the anomaly by analyzing personal information treatment patterns managed by the organizations, and on the measures to coup with the leaks, misuse, and abuse of personal information. Particularly, this research is intended to suggest privacy leakage monitoring system design, which can be managed by making the elements related to personal information leaks to numeric core risk indexes to be measured objectively.

Privacy Management Based on Profile for Personalized Services in u-City (u-City환경에서 맞춤형 서비스 제공을 위한 프로파일기반 개인 정보보호 관리)

  • Lee, Jun-Gyu;Kim, Ji-Ho;Song, Oh-Young
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.135-144
    • /
    • 2010
  • U-City pursues personalized service by collecting contexts through sensors located over the city and presenting the service automatically depending not on the user's request but on the situations that are needed. To provide the personalized service, however, contexts collected through various sensors are needed, and they include private information. Therefore, it is important to keep a balance between the convenience by presenting service and protecting private information. In this paper, we classify and grade person's various contexts requested in the personalized service environment. Based on these, we make decisions on whether to present the service or not by profile-matching between user profile and service profile. Also, we propose an efficient privacy-protection management scheme to encrypt transmitted private information and to control key distribution.

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

A Study on Consumer Information Needs and Education Needs according to the Consumer Problem in Information Society - Focused on E-commerce- (정보화 사회에서의 소비자문제에 따른 소비자정보요구 및 교육요구에 관한 연구 - 인터넷 상거래를 중심으로 -)

  • 류미현
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.12
    • /
    • pp.131-144
    • /
    • 2002
  • The purpose of this study was to identify the degree of experience and the consumer problem perception on its seriousness in relation to E-commerce in information society and how much consumers wanted to be provided with consumer information and education. The major findings of this study were as follows: 1. The consumers showed the highest degree of consumer information needs related to the protection of private information and the highest degree of consumer education needs related to consumerism/law/method of compensation for damages. 2. The consumers showed the highest level of anxiety at a time of e-commerce in to the total causal effect of the variables influencing consumer information needs and the variable of sex(male university students)showed the greatest total causal effect in relation to consumer education needs.

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.9 no.3
    • /
    • pp.461-476
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Private security industry based on current status (현황으로 살펴보는 민간경비업)

  • Park, Su-Hyeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.177-179
    • /
    • 2020
  • 본 논문에서는 경찰청에서 제공하는 2019년 민간경비업체와 민간경비원의 현황을 통해서 민간경비의 다양한 해석과 사각으로 이론적 기반을 마련하는 것을 목적으로 한다. 민간경비업체와 경비원 수는 총 5356개와 16만 3177명으로 나타났다. 현황으로 살펴본 민간경비업의 특징은 크게 4가지가 나타났다. 첫 번째 민간경비업체 수와 경비원의 수가 수도권으로 집중되었다. 기계경비원을 제외하고 53%~89%가 수도권(서울·경기·인천)에 집중되었다. 두 번째, 시설경비에 대한 집중이다. 시설경비가 민간경비업체와 경비원 수에 차지하는 비율은 각각 83%와 86%를 차지함으로써 경비업법에 의한 구분이 아닌 경비원은 곧 시설경비원을 뜻하는 것처럼 느껴지게 되었다. 세 번째, 비정상적인 신변보호 업체 수와 경비원 수이다. 2019년 기준으로 신변보호 업체의 수보다 신변보호원이 없는 상황이 발생하고 있고, 이는 허가만 유지, 시설경비업무와 경계모호, 신고 누락, 자체경비 전환으로 인한 것으로 보인다. 네 번째, 특수경비업의 특수성이다. 국가중요시설에서 일하는 특수경비원은 국가의 정책에 따라서 한국공항공사의 한공보안파트너스, 인천공항공사의 인천공항경비를 자회사로 하고 정규직 전환을 진행 중에 있기 때문에 특수경비업체 수와 경비원 수의 변화는 불가피한 것으로 보인다.

  • PDF