• Title/Summary/Keyword: 개인정보관리체계

Search Result 369, Processing Time 0.024 seconds

A Study on Management of Personal Archives : How to Make My Archive (개인기록 관리 방안 연구 '나의 아카이브(My Archive)' 만들기)

  • Choe, Yu Ri;Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.47
    • /
    • pp.5-49
    • /
    • 2016
  • Compared with public archives, personal archives are likely to disappear if creators don't preserve and manage them. So personal archives must be managed by oneself. But it's difficult to manage their archives systematically for people who don't have the expertise in archival science. Besides, there are not enough available informations. So this thesis suggests how to manage personal archives by two steps. First step is figuring out one's own archives through analyzing one's life by top-down approach and organizing them into collection. Second step is conducting archival appraisal by three steps and establishing classification schemes, describing them. Especially, this study adduce description elements using ISAD(G) for personal archives. this study also recommends using blogs on portal to manage one's archives easily. But they don't have the audit train and exporting function. So this thesis emphasizes the necessity of 'customized archive blogs'. At conclusion, this study highlights the necessity of developing education programs and manuals for people who are trying to manage one's own archives.

Dynamic Sensitivity Level Measurement for Privacy Protection (개인정보보호 강화를 위한 동적 보안수준 결정)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.137-150
    • /
    • 2012
  • For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property information consisting of private information, this article suggests Dynamic-Security-Level-Measurement for property information. DSLM adopts the variable characteristics of property information as the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.

A Design of Obesity Context-Award Service System for U-health Service on Based Ontoloty (U-health 서비스를 위한 온톨로지 기반의 비만상황인식 서비스시스템의 설계)

  • Sung-Woong Hong;Pyeong-Jung Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.36-39
    • /
    • 2008
  • 가정에서 쉽게 측정 가능한 신장, 체중, 체지방율 등의 측정만으로 본인의 비만정도를 인지하게하고, 각 개인마다 상황 정보 기술을 활용하여 개인 비만상황, 집안의 비만상황 등을 총괄하여 체계적으로 관리하고, 이들의 최근 몇 달 동안 또는 몇 년 동안 비만 이력 관리 등을 통하여 비만상황에 따라 지속적인 대처방안을 알려주는 시스템의 개발이 절실히 요구되고 있다. 본 연구에서는 U-health 서비스를 위한 비만상황 인식과 개인이력관리 및 비만증상 온톨로지를 제안한다. 또한 비만관리 서비스를 구축하기 위하여 비만관련 증상, 요인, 대처방법 등을 온톨로지화하여 서비스 시스템에 적용함으로써 U-health 서비스를 위한 온톨로지 기반의 비만상황인식 서비스시스템(OCS)을 설계하였다.

The suggestion of new big data platform for the strengthening of privacy and enabled of big data (개인정보 보안강화 및 빅데이터 활성화를 위한 새로운 빅데이터 플랫폼 제시)

  • Song, Min-Gu
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.155-164
    • /
    • 2016
  • In this paper, we investigate and analyze big data platform published at home and abroad. The results had a problem with personal information security on each platform. In particular, there was a vulnerability in the encryption of personal information stored in big data representative of HBase NoSQL DB that is commonly used for big data platform. However, data encryption and decryption cause the system load. In this paper, we propose a method of encryption with HBase, encryption and decryption systems, and methods for applying the personal information management system (PMIS) for each step of the way and big data platform to reduce the load on the network to communicate. And we propose a new big data platform that reflects this. Therefore, the proposed Big Data platform will greatly contribute to the activation of Big Data used to obtain personal information security and system performance efficiency.

A case study of Privacy Impact Assessment for C-Shopping Mall (C쇼핑몰 개인정보 영향평가 사례연구)

  • Jeon, Dong-Jin;Jeong, Jin-Hong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.73-82
    • /
    • 2012
  • This paper reviews Privacy Impact Assessments in order to perform preventing and diagnosis against potential threats focused on the C-Shopping mall case. The quality of protection in C-shopping mall shows that the corporations itself is 29.2, the system is 68.8, the life cycle of the privacy is 25.5 and CCTV is 60.0. The lowest levels are the corporation's management 16.7, the life-cycle's saving and keeping 12.5, usage and offer 11.5 and destruction 16.7 among the life cycle of the privacy. The result of risk analysis shows that the highest levels are saving and keeping 13.3 and destruction 13.0. From the result, dangerous duplications are saving and keeping and destructions.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

A Study on the Effect of Smart Working Promotional Systems on the Effectiveness of Smart Working at the Individual and Organizational Levels in South Korea: A Focus on Institutional, Managerial, and Infrastructural Factors (스마트워크 추진체계가 개인과 조직의 스마트워크 효과성에 미치는 영향에 관한 연구 : 제도적, 관리적, 그리고 인프라적 요인을 중심으로)

  • Koo, Joo Young;Lee, InHo;Lee, Hyo Jin;Kim, Seonghyeon;Park, Daemin
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.566-579
    • /
    • 2020
  • The aim of this study was to determine how to improve smart working in South Korea. Smart working has recently become a key issue in e-government and flexible working studies. Smart working can improve public servants' quality of life and job performance. However, institutional, managerial, and infrastructural conditions that support smart working must be implemented for smart working arrangements to be successful. Therefore, this study analyzed the impact of institutions, management, and infrastructure on the effectiveness of public servants working in smart working conditions. The results showed that institutional, managerial, and infrastructural factors have a significant impact on the effectiveness of civil servants working in smart working conditions. Institutional and infrastructural factors also influenced organizational effectiveness. These findings have implications for how to manage smart working in the public sector in South Korea.

Privacy Framework in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경내 개인정보보호 프레임워크 적용 방안)

  • Hong Seng-Phil;Lee Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.157-164
    • /
    • 2006
  • Information is playing a key role in sufficing the needs of individual members of the society in today's rapidly changing environment. Especially, the cases of illegal gathering of privacy information will increase and the leakage of privacy information will grow as the individual activities in the ubiquitous computing environment. In this paper, we suggested the privacy framework in order to make design and implementation of secure and effective privacy management system. Ant we also introduced the methodology which is represent to 5 specific stages in order to suggest to the privacy system development guideline from the standpoints of the privacy system operator or developer. Especially, we tried to determine whether the suggested methodology can be effectively used in the real computing environment or not by making necessary investments in management (privacy policy) and technical (system architecture) sides. We believe that the privacy framework and methodology introduced in this research can be utilized to suggest new approach for showing direction from the privacy protection perspective, which is becoming more important in ubiquitous environments, and practical application rather than providing conceptual explanation from the views of engineer or developer.

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.

Development of Mobile Alarm System using Message Tree for Personal Information Management (개인정보관리를 위한 메시지 트리 기반의 모바일 알람 시스템 구축)

  • Jang, Eun-Young;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.153-162
    • /
    • 2009
  • When a private information security incident occurs, the people who own the information are not acknowledged about their information leakage until those affairs appear in public media. This research aims at developing a mobile alarm system for acknowledging suspicious events to the information owners. The mobile alarm system was designed considering the limited user interface of mobile terminal and concept of "personal information leakage message tree" is deployed. The message tree contains every possible situation about personal information leakage and the leaves of the tree has several choices that the information owner can select. This message tree concept enables each information owner to manager his or her information leakage situation by just pushing a few buttons of mobile device. The contribution of this paper is in design of a comprehensive alarm message tree and development of mobile alarm system containing the message tree concept.