• Title/Summary/Keyword: 개인정보관리체계

Search Result 372, Processing Time 0.035 seconds

An Evaluation of Website Information Architecture for Old Adults: Focused on Organization and Labeling System (고령층을 위한 웹 사이트 정보 구조 평가: 조직화 체계와 레이블링 체계를 중심으로)

  • Seo, Jiwoong;Kim, Heesop
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.1
    • /
    • pp.181-196
    • /
    • 2016
  • The objective of this study is to evaluate the organization system and the labeling system of information architecture of a website for the elderly. To achieve this aims, we selected a representative website, i.e., Naver, and the participants were conducted given three types of search tasks using their own information literacy skills and they were answered to the questionnaire and an additional interview, if necessary. A total of 74 valid data were collected through the experiment, and we analyzed the data using SPSS Ver. 20. It revealed that Naver received a positive evaluation in the organization system aspect, particularly its systematic subject categorization and chronological browsing mechanisms. Old adults were preferred the icon-based labeling than the text-based labeling system, and showed a significant difference among their academic backgrounds.

Big Data Governance Model for Smart Water Management (스마트 물관리를 위한 빅데이터 거버넌스 모델)

  • Choi, Young-Hwan;Cho, Wan-Sup;Lee, Kyung-Hee
    • The Journal of Bigdata
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2018
  • In the field of smart water management, there is an increasing demand for strengthening competitiveness through big data analysis. As a result, systematic management (Governance) of big data is becoming an important issue. Big data governance is a systematic approach to evaluating, directing and monitoring data management, such as data quality assurance, privacy protection, data lifetime management, data ownership and clarification of management rights. Failure to establish big data governance can lead to serious problems by using low quality data for critical decisions. In addition, personal privacy data can make Big Brother worry come true, and IT costs can skyrocket due to the neglect of data age management. Even if these technical problems are fixed, the big data effects will not be sustained unless there are organizations and personnel who are dedicated and responsible for data-related issues. In this paper, we propose a method of building data governance for smart water data management based on big data.

Design of Role-Based Access Control Model for Protecting the Medical Information (의료 정보 보호를 위한 역할기반 접근 제어 모델 설계)

  • 노승민;이수철;황인준;박상진;김현주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.358-360
    • /
    • 2004
  • 환자의 의료 및 질환정보는 개인의 프라이버시에 관련되므로 민감하게 취급되어야 하는 정보이다. 이러한 의료 및 질환정보의 유출은 환자의 사회적인 고립뿐 아니라 환자의 생명도 위협하게 되므로 철저한 보안이 필요하다. 따라서, 의료진, 환자, 일반인 등의 사용자 식별을 통한 진료 기록의 접근 통제 및 사용 권한에 따른 정보의 암호화 수준과 해당 정보에 대한 역할 기반의 접근 제어(Role-Based Access Control)를 제공해야 한다. 또한, 환자 자신으로 하여금 자신의 의료 및 질환정보에 대한 다른 사람의 접근권한을 줄 수 있으며, 그 외의 대부분의 접근 권한들은 Role-Permission Broker를 통해서 제어될 수 있다. 본 논문은 RBAC 모델을 현재의 의료 및 질환 정보 관리에 적용시켜 각 정보 개체들과 사용자간의 효율적인 역할 분담과 정보 보호를 추구한다. 이러한 방식은 현재의 의료 및 질환정보 관리 체계를 개선할 것으로 기대한다.

  • PDF

Research of knowledge-based management activation and knowledge worker training plan (지식경영활성화 및 지식근로자 양성방안에 관한 연구 : A 기관의 사례)

  • Seo, Sang-Cheol;Jang, Gi-Jin
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.535-549
    • /
    • 2003
  • 우리가 살아가는 21 세기는 산업화시대와는 달리 급격한 경영환경의 변화 기술융합을 통한 끊임없는 신기술의 등장, 가치사슬의 변화, 프로세스(process)의 통합과 자동화로 인한 가격 등이 파괴되면서 생존을 위한 치열한 경쟁의 시대로 접어들고 있다. 이러한 사회환경의 변화에 따라 지식의 창출 못지 않게 지석의 보호도 중요하게 되었다. 그러나 공공기관의 지식은 체계적인 관리 체계가 이루어지지 않아 담당자의 인사.이동 혹은 퇴직 등으로 인하여 축적된 업무지식이 개인과 함께 그 조직에서 사라져 지식경쟁력이 약화되는 현상을 초래하고 있다. 따라서 본 연구에서는 기존의 단위업무시스템을 통합하여 새롭게 구축된 지식관리시스템을 조기에 정착시키고 이를 활용하여 무형자산의 가치를 극대화하기 위한 방안으로 $2002.12.01{\sim}2003.05.31$ 까지 6 개월 동안 지식관리시스템에 등록된 지식을 분석하여 지식경영을 활성화할 수 있는 방안과 미래사회의 핵심이 될 지석근로자를 양성할 수 있는 방안으로 자신의 능력을 극대화할 수 있는 3 가지 원리와 5 차원 전면교육학습법에 대하여 제시하였다.

  • PDF

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Analysis of Member Information Collection in the National Level of Lifelong Education Information System (국가 수준 평생교육 정보시스템의 회원 정보 수집 현황 분석)

  • Beom, Sangyoon;Jeong, Youngsik
    • 한국정보교육학회:학술대회논문집
    • /
    • 2021.08a
    • /
    • pp.247-252
    • /
    • 2021
  • The quality growth of online education triggered by remote education platforms such as Coursera and edX has increased the demand for lifelong education through online platforms. In response, South Korea has also created various lifelong education support systems and sites in government agencies and local governments. Each support system and web sites created its own member information collection system. The systematic collection and utilization of learners' information requires an integrated member management system of each system. Therefore, the current status of member information collection of state-level lifelong education support systems was analyzed. Based on this, it distinguishes between member information that systems collect in common and information that they collect separately. It will help to bridge the items underlying the integrated membership framework.

  • PDF

A Study on the Improvement of Personal Information Protection in Small and Medium-sized Medical Institutions (중소형 의료기관의 개인정보 보안실태 및 개선방안)

  • Shin, Min ji;Lee, Chang Moo;Cho, Sung Phil
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2019
  • Rapid developments of IT technology has been creating new security threats. There have been more attacks to get patients' sensitive personal information, targeting medical institutions that are relatively insufficient to prevent and defend against such attacks. Although the government has required senior general hospitals to get the ISMS certification since 2016, such a requirement has been burdensome for small and medium-sized medical institutions. Therefore, this study was designed to draw measures to identify and improve the privacy status of the medical institution by dividing it into management, physical and cyber areas for small and medium-sized medical institutions. The results of this study showed that the government should provide financial support and managerial supervision for the improvement of personal information protection of small and medium-sized medical institutions. They also suggested that the government should also provide medical security specialists, continuous medical security education, disaster planning, reduction of medical information management regulations not suitable for small and medium sized institutions.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

IoT based Multi 3D Printers Management for Personalized Manufacturing Service (개인화 제조 서비스를 위한 IoT기반 멀티 3D프린터 관리 방안 연구)

  • Kang, Hyun-chul;Han, Hyon-young;Bae, Hee-chul;Lee, Eun-seo;Son, Ji-yeon;Kim, Hyun;Kim, Young-kuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.570-571
    • /
    • 2017
  • The manufacturing industry is evolving from the automation process to the intelligent process through ICT convergence As the spread of 3D printers, 3D printing technology is becoming a technology that leads the Industry4.0. In this paper, we propose and implement a multi-3D printer management structure and control method based on IoT optimized for personalized manufacturing services.

  • PDF

A Design and Implementation Android-based Health Application (안드로이드 기반 헬스 애플리케이션 설계 및 구현)

  • Soojung Lee;Jae-Yeop Kim;Min-Woo Park;Ji-Hyeok Choi
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.503-504
    • /
    • 2023
  • 본 논문에서는 최근 헬스 인구의 증가에 따라 수요가 늘어난 '헬스 애플리케이션'을 직관적인 UI(User Interface)와 효율적인 루틴 관리를 제공할 수 있도록 설계하고 구현하였다. 이 애플리케이션은 사용자의 운동 습관과 체중 관리를 도와 체계적인 운동을 할 수 있게 하고, 사용자는 운동 정보와 계획, 동기부여 등 긍정적인 효과를 기대할 수 있다. 또한 회원가입 및 개인정보 변경시 이메일 인증을 거치게 구현하여 정보 보안을 강화하였다.

  • PDF