• Title/Summary/Keyword: protection of personal information

Search Result 781, Processing Time 0.027 seconds

Reflections on the US FDA's Warning on Direct-to-Consumer Genetic Testing

  • Yim, Seon-Hee;Chung, Yeun-Jun
    • Genomics & Informatics
    • /
    • v.12 no.4
    • /
    • pp.151-155
    • /
    • 2014
  • In November 2013, the US Food and Drug Administration (FDA) sent a warning letter to 23andMe, Inc. and ordered the company to discontinue marketing of the 23andMe Personal Genome Service (PGS) until it receives FDA marketing authorization for the device. The FDA considers the PGS as an unclassified medical device, which requires premarket approval or de novo classification. Opponents of the FDA's action expressed their concerns, saying that the FDA is overcautious and paternalistic, which violates consumers' rights and might stifle the consumer genomics field itself, and insisted that the agency should not restrict direct-to-consumer (DTC) genomic testing without empirical evidence of harm. Proponents support the agency's action as protection of consumers from potentially invalid and almost useless information. This action was also significant, since it reflected the FDA's attitude towards medical application of next-generation sequencing techniques. In this review, we followed up on the FDA-23andMe incident and evaluated the problems and prospects for DTC genetic testing.

A Study on NTIS Revitalization Plan through the National Research Automated Registry System (국가연구자등록코드시스템을 통한 NTIS 활성화 방안 연구)

  • Lee, Sang-Hwa
    • Journal of Korea Technology Innovation Society
    • /
    • v.13 no.1
    • /
    • pp.28-43
    • /
    • 2010
  • Recently, the establishment of Project Management System for National Research and Development Projects focusing on researchers has drawn sharp attention through revision of applicable laws and regulations, and presentation of national policy tasks for the management of national R&D projects, however, it is insufficient to say that a remarkable system has been established by researchers. In this study, a National Research Automated Registry Code Numbering System was suggested by using a National R&D Projects Human Resource Declaration System for Project Management System for National R&D Projects focusing on researchers. In addition, a National Research Automated Registry Code System was sought in order to realize this system. Through this suggestion, consolidation of personal information protection can be attainted through the national career management, and by raising the participation of researchers naturally, reduction in administrative affairs, simplification of accomplishments verification, and improvement in investigation, analysis and evaluation statistic quality can be expected.

  • PDF

A Study on the Video Privacy Protective Mechanism (영상 프라이버시 보호 메커니즘에 관한 연구)

  • Kim, Minsu;Kim, Jongmin;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.49-55
    • /
    • 2017
  • In case of security of IoT-based areas in ICBM industry, the anxiety about safety goes to extremes in public and national safety area, so that the demand for security service related to disaster/safety management is increasing. Like this, as a security service for safety, CCTVs are installed/operated for the purpose of maintenance of public order and crime prevention. Especially, as the recorded images are presented as crucial evidences of crimes, they are rapidly increasing. However, as adverse effects of CCTVs, it is highly possible to unintentionally leak personal information in the process of performing the original purpose, or to violate someone's privacy in case when such technologies are abused. Therefore, it would be necessary to have researches on the multilaterally-combined mechanism for the protection of image privacy.

A Study on the Analysis and the Improvement of the MyData System from a Consumer Behavior Perspective (소비자행동 측면에서의 마이데이터 제도 분석 및 개선방안 연구)

  • Young-Jong Lee;Seong-Yeob Lee
    • Industry Promotion Research
    • /
    • v.9 no.3
    • /
    • pp.163-174
    • /
    • 2024
  • MyData is a new entity that strengthens the rights of information subjects through the 'right to data portability' and utilizes data to enable hyper-personalized services using personal information. Korea's MyData system is recognized globally as an outstanding system in that it is creating a new MyData industry by granting the right to information self-determination through the 'right to request data transmission'. Now in its third year, this study evaluates Korea's MyData system from a consumer behavior perspective and identifies issues for improvement. To this end, this study reviewed previous research on the relationship between regulatory policy and consumer behavior to determine the applicability of a consumer behavior perspective in institutional evaluation. In addition, in a study on consumer behavior related to MyData, variables that affect the use of MyData were investigated and evaluation items from a consumer behavior perspective were derived. As a result of evaluating Korea's MyData system from a consumer behavior perspective, it was found that the factors considered important by consumers were appropriately reflected in the system. However, in cases where there are dual values of ease of use and personal information protection, regulatory aspects tend to take priority. Therefore, in order to revitalize the MyData industry, it is essential to implement market-friendly system improvements without compromising consumer rights. This study is differentiated from existing studies in that it attempted to derive a plan for system improvement by combining empirical consumer behavior research and regulatory policy research.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.

The design and development of Edugame for Learning Protection of Personal Information in Elementary school students (초등학생 정보보호학습을 위한 에듀게임의 설계 및 개발)

  • Kim, Young-June
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.166-169
    • /
    • 2009
  • '에듀테인먼트(Edutainment)'라는 용어의 등장과 함께 오늘날 게임은 새로운 교수학습매체로 관심을 끌고 있다. Morice(2000)에 의하면 오늘날 컴퓨터 게임은 교수-학습 과정에 있어 다양한 방식으로 접목되고 있으며, 실제로 사용자들이 열광하는 다양한 게임의 장르별 매력적인 요소가 학습에 접목이 가능하다고 제시하고 있다. 본 연구는 이러한 새로운 교육적 패러다임의 변화를 뒷받침 할 수 있는 에듀게임의 효과적인 개발을 궁극적인 목적으로 하여 진행되었다. 구체적으로, 어떻게 하면 막대한 자본이 필요하지 않은 작은 게임의 틀 속에 핵심적인 학습내용을 담아, 에듀게임을 간단하게 조작할 수 있는 툴을 이용하여 어렵지 않게 만들 수 있는가에 대한 의문에서 출발하여 기획된 시나리오와 그것을 바탕으로 제작된 캐주얼 게임을 제시함으로써 교육용 게임의 설계 방향과 활용 방안에 대한 실질적 제안을 하고자 함과 동시에 최근 인류의 생활에 깊숙이 관련되어 있는 컴퓨터 사용에 있어서 이슈가 되고 있는 개인의 정보 보호에 대한 내용을 게임의 주제로 하였으며 그 제목은 '황토의 대모험'으로 명하였다. 게임의 형식은 퀴즈게임과 어드벤처 게임의 복합 형태로, Windows 기반의 모든 종류의 운영제체를 지원하는 통합형 멀티미디어 제작 툴인 Flash MX로 구현하였다. 황토의 대모험의 특징은 다음과 같다. 첫째, 상용화된 멀티미디어 제작 툴로 만들어진 저비용의 간단한 게임을 통한 학습이다. 둘째, 사용자는 다양한 문제 해결 학습을 통하여 게임에서 제공되는 제반 지식을 습득할 수 있다. 셋째, 문제 해결과정에서 정보보호에 대한 의식을 고취하고, 정보보호 방법을 학습하기 전의 기본지식을 습득할 수 있다.

  • PDF

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.

A Study on the Effectiveness of Blockchain and Legal System and Policy Tasks for SMEs (중소기업의 블록체인 적용효과와 법제도 및 정책적 과제에 대한 융합적 연구)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.14-24
    • /
    • 2019
  • It is necessary to look into multiple subjects, such as effectiveness, laws and polices of blockchain in order to easily accept blockchain technology in small and mid-sized enterprises(SME). This study analyzes the positive effects of applying the block chain to SMEs, examines the laws and policies required to apply them, and identifies the tasks. As a result, we confirmed that it can create positive effects such as optimizing supply chain management, simplifying import and export process documents, improving product quality, facilitating flow of funds, and improving transaction reliability. Also, we confirmed that it is necessary to improve the basic law of electronic transaction, electronic commerce law, electronic financial transaction law, personal information protection legislation, and needs policy supplement for platform development, education system for SMEs, transaction standardization guidelines, tax reduction policy, and block chain research and development. More extensive practical research and specific individual legal studies are needed in the future.

Implementation of u-Healthcare Security System by applying High Speed PS-LFSR (고속 병렬형 PS-LFSR을 적용한 u-헬스케어 보안 시스템 구현)

  • Kim, Nack-Hyun;Lee, Young-Dong;Kim, Tae-Yong;Jang, Won-Tae;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.99-106
    • /
    • 2011
  • The emerging of ubiquitous computing and healthcare technologies provides us a strong platform to build sustainable healthcare applications especially those that require real-time information related to personal healthcare regardless of place. We realize that system stability, reliability and data protection are also important requirements for u-healthcare services. Therefore, in this paper, we designed a u-healthcare system which can be attached to the patient's body to measure vital signals, enhanced with USN secure sensor module. Our proposed u-healthcare system is using wireless sensor modules embedded with NLM-128 algorithm. In addition, PS-LFSR technique is applied to the NLM-128 algorithm to enable faster and more efficient computation. We included some performance statistical results in term of CPU cycles spent on NLM-128 algorithm with and without the PS-LFSR optimization for performance evaluation.