• Title/Summary/Keyword: 개인정보 처리

Search Result 2,411, Processing Time 0.028 seconds

A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure (개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석)

  • Tae Chul Jung;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.6
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

Fingerprint Recognition using Information of Ridge Shape of Minutiae (특징점의 융선형태 정보를 이용한 지문인식)

  • Park Joong-Jo;Lee Kil-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.6 no.2
    • /
    • pp.67-73
    • /
    • 2005
  • Recently, the social requirement of personal identification techniques has been increasing. Fingerprint recognition is one of the biometries methods that has been widely used for this requirement. This paper proposes the fingerprint matching algorithm that uses the information of the ridge shapes of minutiae. In which, the data of the ridge shape are expressed in one-dimensional discrete-time signals. In our algorithm, we obtain one-dimensional discrete-time signals for ridge at every minutiae from input and registered fingerprints, and find pairs of minutia which have the similar ridge shape by comparing input fingerprint with registered fingerprint, thereafter we find candidates of rotation angle and moving displacement from the pairs of similar minutia, and obtain the final rotation angle and moving displacement value from those candidates set by using clustering method. After that, we align an input fingerprint by using obtained data, and calculate the matching rate by counting the number of corresponded pairs of minutia within the overlapped area of an input and registered fingerprints. As a result of experiment, false rejection rate(FRR) of $18.0\%$ at false acceptance rate(FAR) of $0.79\%$ is achieved.

  • PDF

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

Cognitive Development of Brand as a Heuristic (소비자 휴리스틱을 통한 인지적 발달 관점에서의 브랜드)

  • Na, Woon Bong;Roger Marshall;Son, Young Seok
    • Asia Marketing Journal
    • /
    • v.13 no.3
    • /
    • pp.163-182
    • /
    • 2011
  • The focus of this paper is to investigate cognitive development of brand heuristics in the mind of a young consumer as the consumer matures. This issue was examined by comparing the nature of the set of associations (that form the brand heuristic) given by consumers across four different age groups, with each age group representing a distinct stage of cognitive maturity. It is found that there are fundamental differences in the way the different age groups perceive the brand. The research method uses the novel approach of classifying the elicited associations into the three types of brand associations: attributes, benefits and attitudes. This classification enables comparisons of the nature of brand associations and the changes that occur as a consumer matures. To conclude, implications for theory and practice are discussed.

  • PDF

3D Face Recognition using Projection Vectors and Surface Curvatures (투영 벡터와 표면 곡률을 이용한 3차원 얼굴 인식)

  • Park, Rocky;Lee, Yeung-Hak;Yi, Tai-Hong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.1
    • /
    • pp.130-137
    • /
    • 2006
  • The depth information in the face represents personal features in detail. In particular, the surface curvatures extracted from the face contain the most important personal facial information. This surface curvature and together with grouped projection vector which reduces the dimensions resulting less computations are collaborated into the proposed 3D face recognition algorithm. The maximum and minimum curvature are calculated from the surface curvature image, which are grouped into projected vectors for recognition. The minimum curvature showed the best recognition rate among the surface parameters.

Illumination Robust Extraction of Facial Region including Hair Method (조명에 강인한 머리카락을 포함한 얼굴 영역 추출 방법)

  • Park, Sung-Soo;Lee, Hyung-Soo;Kim, Dai-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.415-418
    • /
    • 2007
  • 본 논문은 머리카락을 포함한 얼굴 영역 추출에 관한 것으로서, 보다 구체적으로는 조명변화에도 강인 한 얼굴영역 추출방법과 다양한 머리카락의 모양과 색의 변화에도 신뢰성 있는 머리카락 추출 방법에 관한 것이다. 일반적으로 얼굴영상은 개인의 특징을 잘 표현할 수 있는 정보로써, 영상에서 얼굴 영역을 추출하여 이를 실제 얼굴영상정보를 이용한 얼굴인식, 관상정보 서비스를 위한 전처리, 기반기술을 제공하고, 실사 캐릭터 제작에도 바로 적용될 수 있다. 기존의 템플리트 매칭, 곡선추적 알고리즘 등과의 같은 추출방법에서는 얼굴크기 변화, 안경 및 장신구의 착용 여부 그리고 조명의 변화에 따라 얼굴영역 추출하는 처리속도가 많이 걸리고, 성능이 크게 저하되는 문제점이 있다. 상기한 바와 같이 종래의 문제점을 개선하기 위하여, 본 논문에서는 얼굴의 크기변화, 안경 및 장신구의 착용 여부 그리고 조명의 변화에서도 얼굴 영역을 잘 추출 할 있는 방법과 다양한 머리카락의 색, 형태 변화에도 신뢰성 있는 머리카락 추출방법을 제안하였다.

  • PDF

Production of Digital Image Map using Aerial Photo and Geospatial Information System (항공사진과 지형공간정보체계를 이용한 수치영상지도 제작연구)

  • Sohn, Duk-Jae
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.5 no.2 s.10
    • /
    • pp.207-220
    • /
    • 1997
  • This study aims to develope the production method of digital image map of high capable utiliy and terrain interpretability using aerial photo and Geospatial Information System. Theory and efficient practical method was studied to generate tile digital image map with low-cost personal computer system using the merging procedure of raster scanned aerial photo and vector topographic map. Determination theory of ground coordinates, digital image processing, production of digital elevation model was reviewed. And some chariteristics of digital image map, image collection method and significant concepts of digital image processing was studied. Also input and output way of image data to generate the digital image nap, production method of orthophoto map using aerial photo through digital differential rectification was studied. As the result, digital image map was produced and analyzed through the above mentioned procedures.

  • PDF

A Korean Input Method in Platform_free Environment (플랫폼독립적 환경에서 한글 입력 방법)

  • Shin, Gab-Jae;Lee, Hyoung-Jick;Byun, Jeong-Yong
    • Annual Conference on Human and Language Technology
    • /
    • 2002.10e
    • /
    • pp.77-82
    • /
    • 2002
  • 현행 한글 입력방법은 운영체제 의존적 문자입력 방법을 채택하고 있다. 즉 운영체제가 채택하는 문자입력방식에 의존적이다. 특히 인터넷의 발전으로 세계 어느 곳에서나 인터넷을 통한 정보 검색이나 전자상거래와 같은 일을 할 수 있게 되었다. 정보검색이나 전자상거래와 같은 각종 한글 인터넷 응용은 전 세계 어느 곳에서나 이용 요구가 있다. 여기서 한글의 출력은 대부분 가능하지만 입력은 운영체제의 입력기(IME, AMI)에 의존적이어서 입력을 하려면 한글 입력기를 설치해야 한다. 또한 대부분 일반 이용자는 이를 설치하기 어렵고, 국외에서 이용하려면 플랫폼은 개인 휴대 시스템이 아닐 경우 입력기를 설치할 수 없을 것이다. 이를 편리하게 가능하도록 하기 위하여 해당 한글 웹 응용이 직접 한글 입력기능을 제공하여 플랫폼에 의존하지 않고 독립적으로 한글 입력이 가능한 방안을 제시하고 이를 구현하여 가능함을 보였다. 본 논문은 플랫폼 독립적인 환경에서 인터넷을 통한 한글의 입력방법의 필요성과 그것이 가지는 한계점을 검토하고 응용프로그램과의 연동하는 한글 입력방법을 제안하고 구현하였다.

  • PDF

Design of Online Certificate Revocation Information Transfer using Verifier Lists (검증자목록을 이용한 실시간 인증서 폐지 정보 전송의 설계)

  • 이용준;정재동;오해석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.45-54
    • /
    • 2003
  • A public key certificate may be revoked before its validity period due to causes like the owner identification information change or the private key damage. Since a certificate has long valid time relatively, it is possible to become revoked during lifetime of certificate. The main technical issue in the public key infrastructure is how to handle the status of the certificate. We propose a simple mechanism for online certificate status validation that is suited to the financial network The characteristic of the proposed method is to broadcast certificate revocation information by using verifier list. The experimental results provide the same realtime as OCSP(Online Certificate Status Protocol). The proposed mechanism reduces the network load for certificate status validation in highly concentrated unbearable network.

Design of Personalized Exercise Data Collection System based on Edge Computing

  • Jung, Hyon-Chel;Choi, Duk-Kyu;Park, Myeong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.5
    • /
    • pp.61-68
    • /
    • 2021
  • In this paper, we propose an edge computing-based exercise data collection device that can be provided for exercise rehabilitation services. In the existing cloud computing method, when the number of users increases, the throughput of the data center increases, causing a lot of delay. In this paper, we design and implement a device that measures and estimates the position of keypoints of body joints for movement information collected by a 3D camera from the user's side using edge computing and transmits them to the server. This can build a seamless information collection environment without load on the cloud system. The results of this study can be utilized in a personalized rehabilitation exercise coaching system through IoT and edge computing technologies for various users who want exercise rehabilitation.