DOI QR코드

DOI QR Code

A study on Utilization of Big Data Based on the Personal Information Protection Act

개인정보보호법에 기반한 빅데이터 활용 방안 연구

  • Kim, Byung-Chul (Dept. of Information and Communication, Baekseok University)
  • 김병철 (백석대학교 정보통신학부)
  • Received : 2014.09.24
  • Accepted : 2014.12.20
  • Published : 2014.12.28

Abstract

We have noted a possibility of big data as a solution of social problem and pending issue. At the same time big data has a problem of privacy. Big data and privacy were in conflict. In this paper we pointed out that issue and propose a planning of big data based on privacy using case study of advanced country.

최근 대규모 데이터 처리와 다양한 형태의 데이터 처리 기술이 진화함에 따라 사회문제 진단 및 현안 해결 도구로써 빅데이터의 잠재력에 주목하고 있다. 동시에 빅데이터의 위험요소로 프라이버시 문제가 강력하게 제기되고 있기도 하다. 빅데이터의 적극적인 활용과 프라이버시 문제는 서로 상충되는 관례로써 본 논문에서는 이와 관련한 당면한 문제점을 지적하고, 해외 선진국의 사례분석을 통해 우리나라의 개인정보보호에 기반한 빅데이터 활용방안을 제안하고자 한다.

Keywords

References

  1. Bil Franks, Taming The Big Data Tidal Wave-Finding Oportunities in Huge Data Streams with Advanced Analytics, WILEY, 2012
  2. Jeong Young-soo, Protection of privacy in the Big Data times, NIA PRIVACY ISUES, pp.1-8, 2012
  3. Yun Mi-rim, The Challenges and take advantage of big data business, Korea Information Industry Association Issue Report, pp.10-13, 2012
  4. Gartner, 2014 Hype Cycle for Emerging Technologies Maps the Journey to Digital Business, 2014
  5. Lee Jae-sik, Technology for Privacy in big data environments, FOCUS 4, pp.79-104, 2013
  6. Privacy Commissioner, The suggest for Big Data Privacy Guidelines, 2014
  7. NIA(Kim Seong-tae), Big Data Strategy Research Center, Personal data protection and the use of Big Data times, IT & Future Strategy, 2013
  8. Kim Seoung-yun, Recent global trends and issues for BigData: Big Data use cases in the public sector for national competitiveness, 2012

Cited by

  1. A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing vol.6, pp.1, 2015, https://doi.org/10.15207/JKCS.2015.6.1.085