• Title/Summary/Keyword: 개인정보경영시스템

Search Result 226, Processing Time 0.028 seconds

Development of Personalized Infectious Diseases Information Provision System (개인 맞춤형 감염병 정보 제공 시스템 개발)

  • Kim, Min-soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.629-631
    • /
    • 2020
  • 코로나19의 전 세계적인 확산은 사회·경제적으로 큰 변화를 가져왔다. 또한, 새로운 기회를 가져오기도 했다. ICT 기술 기반의 비대면 산업이 탄력을 기술개발이 극적으로 이루어지고 있으며, 기존의 기술들 또한 다양한 응용이 이루어지고 있다. 이에, 본 논문에서는 감염병에 대한, 개인맞춤형 정보를 제공해주기 위한 서비스를 개발하고 활용하는데 대해서 다루어 보고자 한다.

Affecting the Characteristic Variables(System, Information) of Computing Tax Accounting Systems and Personal Variables to Educational Performance - Focused on KcLep Software - (전산세무회계시스템의 특성변수(시스템, 정보)와 개인변수가 교육성과에 미치는 영향 - KcLep을 중심으로 -)

  • Kim, Hyeon-Gyu;So, Won-Geun;Kim, Ha-Kyun
    • Management & Information Systems Review
    • /
    • v.34 no.5
    • /
    • pp.111-125
    • /
    • 2015
  • The article starts with a review of system characteristic, information characteristic and personal characteristic on educational performance through educational satisfaction. This survey is intended for educatee's who take the course of KcLep. We found that all variables of system characteristic(easiness, flexibility and reliability) significantly effect the educational satisfaction. Information characteristic(timeliness, usefulness) significantly effect on educational satisfaction, but the correctness doesn't significantly effect on educational satisfaction. Personal characteristic(self-efficacy and achievement motivation) significantly effect on educational satisfaction, but the computing ability doesn't significantly effect on educational satisfaction. We found that the educational satisfaction significantly effect on the education performance.

  • PDF

GDPR Compliant Consent Procedure for Personal Information Collection in the IoT Environment (IoT 환경에서 GDPR에 부합하는 개인정보수집 동의 절차)

  • Lee, Goo Yeon;Bang, Junil;Cha, Kyung Jin;Kim, Hwa Jong
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.129-136
    • /
    • 2019
  • Many IoT devices like sensors lack screen and input devices, thus making them hard to meet the consent conditions that GDPR requires. This is acting as a legal barrier for further advancement in the business field. In this paper, we designed the process for consent of personal information collection that meets the legal conditions. In this design, user's personal data is received in an encrypted form by data collecting server first. The encrypted personal data can be decrypted after associating with user agent based on the consent procedure of the collection of personal information. During the consent procedure, user agent understands the privacy policy about personal information collection and offers the key to decrypt the data. This kind of personal information collection agreement procedure will satisfy the transparent and freely given consent requirements of GDPR. Thus, we can speculate from here that the proposed procedure will contribute to the evolution of IoT business area dealing with personal information.

Security and Trust of Mobile Payment Apps : Focus on Personal Predisposition and Security Signal (모바일 결제 앱에서의 보안과 신뢰 : 개인의 성향과 보안 신호를 중심으로)

  • Kim, Min-Gyung;Choi, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.194-204
    • /
    • 2019
  • The mobile payment app market has been expanding recently. However, the usage rate of mobile payment apps is not meeting service providers' expectations due to concerns about security and privacy. This study investigated how personal predisposition and how the security signals of the payment app affect users' perceived privacy and security risks, and how these factors ultimately affect the trust of mobile payment apps. The results showed that privacy concerns increase the risk of perceived personal information leaks and reduce perceived mobile system security, while familiarity, perceived reputation, and assurance seal reduce the risk of perceived personal information leaks and increase perceived mobile system security. Finally, it revealed that the reduced risk of perceived personal information leaks and the increased security of mobile systems had a positive impact on the reliability of mobile payment apps.

A Study on National Control Policy for the Use of Encryption Technologies by an Accused Person (피의자 개인의 암호이용 통제정책에 대한 연구)

  • Baek, Seung-Jo;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.271-288
    • /
    • 2010
  • In this paper, we study the dysfunctions of cryptography as dual-use goods and national domestic encryption control policies like key recovery system and decryption order. And we examine risks of the breach of the peoples' constitutional rights like the right to privacy in these policies and analyze these policies by applying the principle of the ban on the over-restriction. Finally, we propose the direction and requirements of our national domestic encryption control policy that maintains the balance of peoples' constitutional rights and investigatory powers.

A Personalized Recommendation System Using Machine Learning for Performing Arts Genre (머신러닝을 이용한 공연문화예술 개인화 장르 추천 시스템)

  • Hyung Su Kim;Yerin Bak;Jeongmin Lee
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.31-45
    • /
    • 2019
  • Despite the expansion of the market of performing arts and culture, small and medium size theaters are still experiencing difficulties due to poor accessibility of information by consumers. This study proposes a machine learning based genre recommendation system as an alternative to enhance the marketing capability of small and medium sized theaters. We developed five recommendation systems that recommend three genres per customer using customer master DB and transaction history DB of domestic venues. We propose an optimal recommendation system by comparing performances of recommendation system. As a result, the recommendation system based on the ensemble model showed better performance than the single predictive model. This study applied the personalized recommendation technique which was scarce in the field of performing arts and culture, and suggests that it is worthy enough to use it in the field of performing arts and culture.

A Study on the Trend Analysis Based on Personal Information Threats Using Text Mining (텍스트 마이닝을 활용한 개인정보 위협기반의 트렌드 분석 연구)

  • Kim, Young-Hee;Lee, Taek-Hyun;Kim, Jong-Myoung;Park, Won-Hyung;Koo, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • For that reason, trend research has been actively conducted to identify and analyze the key topics in large amounts of data and information. Also personal information protection field is increasing activities in order to identify prospects and trends in advance for preemptive response. However, only research based on technology such as trends in information security field and personal information protection solution is broadly taking place. In this study, threat-based trends in personal information protection field is analyzed through text mining method. This will be the key to deduct undiscovered issues and provide visibility of current and future trends. Policy formulation is possible for companies handling personal information and for that reason, it is expected to be used for searching direction of strategy establishment for effective response.

A study on Effect of Utilization of ERP system on Business performance: Focusing on China Hefei's Universities (ERP시스템의 활용이 대학의 업무성과에 미치는 영향에 관한 연구: 중국 합비시의 대학교를 중심으로)

  • Jung, Choong Young;Joo, Hae Do
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2805-2815
    • /
    • 2014
  • This paper abstracts the key factors affecting business performance by ERP system at university in China and suggests how to use ERP system effectively at university. Main results are as follows: First, concern and support by CEO affects personal business performance of ERP. Second, ERP system education affects organizational business performance of ERP. Third, concern and support by CEO affects business enhancement performance of ERP.

컴퓨터 통신망을 위한 암호화 프로토콜의 고찰 및 개선방안

  • 허용도;손진곤;황종선
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1991.10a
    • /
    • pp.166-174
    • /
    • 1991
  • 정보화 사회가 전개되면서 대규모 컴퓨터 네트워크를 통해 정보나 자원을 서로 효율적으로 공유하는 것이 가능해졌고 이러한 정보나 자원의 공유현상으로 인하여 개인의 권리침해와 보안문제가 크게 대두되었다. 따라서 컴퓨터 통신에서는 이러한 정보나 자원을 효율적으로 관리할 수 있는 암호화 정책 및 메커니즘이 필요하다. 본 논문에서는 현재의 암호화 시스템에서 사용하는 암호화 방식과 사용자를 인증하기 위하여 사용되는 암호화 프로토콜을 비교분석하여 새로운 암호화 프로토콜을 제안하였다.

  • PDF

Context-Based Mandatory Access Control Model (컨텍스트 기반 강제적 접근통제 모델)

  • Oh, Yi-Myun;Choi, Eun-Bok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1161-1164
    • /
    • 2004
  • 정보통신기술의 급속한 발전과 웹을 통한 기업모델의 다양화로 인해 개인정보를 통한 새로운 경영기법의 발전은 향상되었던 반면 개인정보의 오용과 남용은 인터넷 발전의 가장 큰 저해 요소 중 하나로 대두되게 되었다. 그러므로 방대한 정보를 부당한 사용자로부터 보호하면서 개인의 프라이버시를 보장하기 위해서는 적절한 접근통제 정책이 요구되어진다. 본 논문에서는 Biba 모델의 엄격한 무결성 정책에 대한 접근모드, 시스템 상태정보 그리고 주체의 생성과 실행에 따른 제약조건을 기술하였다. 또한, 객체의 용도(purpose)와 접근권한의 제약조건으로 구성되는 컨텍스트를 엄격한 무결성 정책에 적용하므로서 주체에 의한 객체정보의 임의적 연산을 방지하므로서 객체 정보를 보호할 수 있다.

  • PDF