• Title/Summary/Keyword: protection of privacy

Search Result 895, Processing Time 0.028 seconds

Considering on De-Identification Method of Personal Information for National Medical Institute by using correlation (상관도를 이용한 국내 의료기관용 개인정보 비식별화 방안에 관한 연구)

  • Yeo, Kwang Soo;Kim, Chul Jung;Lee, Jae Hyun;Kim, Soon Seok
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.83-89
    • /
    • 2016
  • Guidelines for protecting personal information are already in progress in USA, UK and other countries and announced many guideline like HIPPA. However In Our national environment, we does not have specialized guideline in national medical industries. This thesis suggest De-indentification method in South Korea by referring 'bigdata De-identification Guideline by Ministry of Science, ICT and Future Planning (2015)', ICO in U. K and IHE, NIST, HIPPA in U. S. A. We suggest also correlation between Guidelines. Corelation means common techniques in three guidelines (IHE, NIST, HIPPA in U. S. A). As Point becomes closer five points, We recommend that technique to national medical institute for De-Identification. We hope this thesis makes the best use of personal information's development in National medical institute.

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

Study on IT security audit system for e-commerce private information protection (전자상거래 개인정보보호를 위한 IT보안감사체계 연구)

  • Lee, Eun-kyoung;Park, Byoung-woo;Jang, Seok-eun;Lee, Sang-joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.179-182
    • /
    • 2018
  • 최근 여기어때, 인터파크 등 전자상거래 기업을 대상으로 발생한 개인정보 해킹사고 사례를 보면, 사람의 취약점을 노리는 지능화지속위협(APT) 공격과 알려진 해킹 기술이 복합적으로 이루어지고 있다. 해킹사고가 발생한 기관은 한국인터넷진흥원(KISA) 정보보호관리체계(ISMS) 의무대상 기관으로써 정보보호관리체계를 유지 관리하고 있었다. 그럼에도 불구하고 대형의 개인정보 유출사고가 발생한 주요 원인은 정보보호관리체계가 적용되지 않았던 정보시스템과 인력을 대상으로 해킹이 이루어졌기 때문이다. 해킹 위협의 변화에 따라 전자상거래 보안 수준도 변화해야 하는데, 개인정보보호 관련 규제 준수도 전자상거래 기업에서는 힘든 상황이다. 고객의 개인정보 유출 사고는 일반인을 매출 기반으로 서비스하고 있는 전자상거래 기업에서는 치명적이다. 안전한 전자상거래 플랫폼 기반에서 고객에게 서비스를 제공하기 위해서는 무엇보다도 중요 자산인 고객의 개인정보보호를 위해 역량을 집중해야 한다. 한정된 예산과 자원으로 안전한 서비스를 제공하기 위해서는 기존에 구축된 정보보호관리체계를 기반으로 IT보안감사체계를 전사적으로 확대하여 지속적으로 모니터링 할 필요가 있다. 이에 본 연구에서는 최신 사이버 보안 위협 동향과 전자상거래 기업 대상으로 발생한 최근 개인정보유출사고 사례를 분석을 통해 시사점을 도출하여 전자상거래 개인정보 보호를 위한 IT보안감사체계를 제시하였다.

  • PDF

Study on Digital Finance Secure Architecture based on Blockchain (블록체인 기반의 디지털 금융보안 아키텍처에 관한 연구)

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.415-425
    • /
    • 2021
  • In line with the trend of the digital transformation, the financial sector is providing financial services with new technologies. Among them, the open banking, which is drawing attention from global financial industry, is a service environment that maximizes customers' convenience and data utilization. In addition, the shift in the digital paradigm has also increased anxiety that security problems such as hacking and information leakage caused by data sharing are also concerned. A failure to overcome the negative view will hinder the development of financial services. This study presents a security governance system that can safely and comprehensively manage data in a digital financial ecosystem. This prepares a technical application plan by presenting a digital financial security architecture to field workers, focusing on the open banking service environment. It can be seen that this study is worthwhile by presenting a comprehensive information protection system that allows financial IT to introduce and utilize open banking services in a changing environment.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

The Change of Industrial Structure and Public Interest as to the Convergence of Broadcasting and Telecommunications (방송통신 융합에 따른 산업구조의 변화와 공익성)

  • Joo, Chung-Min
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.109-132
    • /
    • 2006
  • It is difficult to found the concept of public interest properly, being ambiguous to distinguish media and service as to the convergence of broadcasting and telecommunications. Accordingly, it is necessary to found the concept of public interest not related to the character of media and service in the age of digital convergence. Therefore this study intended to re-found the concept of public interest, as to industrial changes in the age of convergence of broadcasting and telecommunications. The convergence of broadcasting and telecommunications causes the changes of value chain, which includes contents, platform, network, terminal. It could not help avoiding modifying the industrial structure of broadcasting and telecommunications, because of the changes of value chain. The changes of industrial structure needs the changes of ideology, regulatory policy, regulatory system, and it creates the foundation of new regulatory idea. The purpose of regulatory idea in the age of digital convergence is to practice public interest, and it is an ultimate purpose to increase consumers' welfare. Consequently, for increasing comsumer' welfare, it is necessary to achieve diversity, fairness, objectivity, the preservation of social value in the aspect of contents. Also in the aspect of platform, it is necessary to achieve the protection of privacy, consumer protection, harmful information blocking, and in the aspect of network, it is necessary to achieve the maintenance of secure network, fair competition. Finally, in the aspect of terminal, it is necessary to achieve the maintenance of compatibility, the solution for digital divide. Then regulatory policy of each value chain from a legal and institutional perspective, should be promoted to provide public interest, step by step.

  • PDF

The Challenge of Personal Information Act for Oral History Project (구술자료의 수집과 서비스에 대한 개인정보 보호법의 도전)

  • Lee, Hosin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.1
    • /
    • pp.193-216
    • /
    • 2017
  • The purpose of this study is to understand issues related to the Personal Information Act recently emerging in the field of oral history, and to prepare countermeasures for oral history academics and archives. The Personal Information Act is intended to protect the confidentiality and freedom of the constitutional privacy, and to assure the right to self-determination of information, thereby realizing the dignity and value of the individual. Oral history is intended for living persons; therefore, strict ethical standards are needed to protect the morality of the person behind the sound recordings and appears as the subject of oral history. However, if the uniform application of the Personal Information Act is made, it is a requirement to make the process of consenting and notifying excessively complex and almost impossible to realize, making collection and service of oral history resource improbable. The mechanical and strict application of the Personal Information Act does not come into being because it has the aspect of undermining the inherent intrinsic value of oral history resources and making it difficult to maintain the authenticity of the records. To solve these problems, it is necessary to revise Article 58 (4) of the Personal Information Act of Korea. In addition, it is necessary to establish a guideline for the establishment of independent ethical standards of oral history itself, especially for the protection of the moral rights of third parties.

Influence Factors of Use Intention of Medical Resort for Medical Tourism Industry (의료관광산업을 위한 메디컬리조트 이용의도 영향요인)

  • Park, You-Young;Boo, Je-Man
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.4
    • /
    • pp.91-104
    • /
    • 2020
  • In this study, the value of the medical resort was divided into hedonic value, hospitality value, safety and personal information protection value, and profitability value by exploring and typifying the successful cases and related services of the medical resort in order to provide the direction of development and policy implications of the medical resort for the medical tourism industry. For those who have used the medical resort, I wanted to verify the impact of the value of medical resort on perception of medical resort and its intention to use it. As a result of this study, it was found that hedonic value and hospitality value of medical resort have a strong influence on usefulness perception and well-being perception of medical resort, that safety and personal information protection value of medical resort was only affected by usefulness perception, and profit value of medical resort was only affected by well-being perception. In addition, the usefulness perception and well-being perception of medical resorts were shown to have an impact on the intention of using medical resorts, especially in the case of well-being perception of medical resorts. The above findings are meaningful in that they expanded the medical resort-related research area for the medical tourism industry and provided useful implications for the development of medical resorts that meet the convenience and needs of medical tourists.

A Study on the Importance of the Assessment of Records Management Metadata Elements Related to the Electronic Medical Records Management System for Medical Records Managers (전자의무기록 관리시스템 관련 기록관리 메타데이터 요소들에 대한 의무기록 관리자의 중요도 평가 연구)

  • Lee, Eun-Mi;Kim, Myeong;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.151-171
    • /
    • 2013
  • To comprehend the importance and necessity of record management metadata standard implemented in an electronic medical records system, a survey was undertaken to 50 medical records managers in charge of 5 major hospitals in Seoul. Analysis of the survey results was performed by averaging the responses given by those who answered the survey. SPSS was utilized for statistical analysis. Managers of medical records placed importance on metadata that are related to security of records, such as "levels of security", "types of access to medical records", "levels of authorization granted to personnel", and "users accessing medical records". It shows that these managers need the functions of privacy protection in ERMS. Metadata on "external disclosure" had the lowest level but those surveyed with more than 7 years of experience placed greater importance in this area more those surveyed with less than 7 years of experience in a hospital. This shows that managers need the functions of external disclosure to meet the needs of third partiesfor medical research and medical education.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.