• Title/Summary/Keyword: 보호정책

Search Result 2,225, Processing Time 0.026 seconds

A Study on the Utilization Schemes of E-Commerce for the Consumer Protecion (소비자보호를 통한 전자상거래 활성화 방안 연구)

  • Park, Chu-Hwan;Lee, Yong-Pil
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.39-56
    • /
    • 2004
  • This study introduces consumer protection policies at domestic and overseas, regarding the current situation that is raised about, and analyzes how to promote e-commerce with consumer protection oriented. This article explores e-commerce protection policies aiming at enforcing consumer protection and introduces some strategies - enhancing consumer trust, improving electronic transaction disputation, personal information security and privacy and using authorized certificate. This paper aims at suggesting the method of promoting e-commerce through ensuring the consumer trust and decreasing the transaction cost.

  • PDF

A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System (암호화 기법을 적용한 침입 탐지 시스템의 룰 보호 기법)

  • Son Hyung-Seo;Kim Hyun-Sung;Bu Ki-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.3-13
    • /
    • 2004
  • Kvarnstrom et al. ${in}^{[10]}$ proposed a rule protection scheme by using one-way hash function to protect rules in security systems over ubiquitous environment. Son et at. ${in}^{[5-6]}$ also prooposed a rule protection scheme for Snort, which is one of the most common IDS. These schemes provide security only for the header information but not for its contents. To solve this problem, this paper presents a scheme based on the symmetric cryptosystem over Snort not only for the header information but also contents. This paper uses the key management based on PCMCIA security module proposed ${by}^{[12]}$ for the symmetric cryptosystem. Our scheme could be adjusted to other security systems, which use the rule based detection.

An Analysis of the Public Awareness on National Policy on Protection of Personal Information: using SERVQUAL (SERVQUAL 기법을 이용한 국가 개인정보보호 정책에 대한 국민 인식의 분석)

  • Lee, Kyung-bok;Yoon, Ki-chan;Shim, Mina;Lim, Jong-in;Park, Tae Hyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1037-1055
    • /
    • 2016
  • After the enactment of the Personal Information Protection Act, policies and activities for the personal information protection have been actively promoted. However the people are showing negative attitudes about personal information, as the ongoing personal data leakages. Therefore, authors tried to empirical analysis of the effectiveness of national policy on the protection of personal information, using SERVQUAL model, focused on the people's perception, in order to identify that how the people recognized current policy. Authors find that the public has perceived the effectiveness of the policy positively, but the level of their awareness is low. And we identify that the people are highly aware of the policy's effectiveness for Immediacy, Convenience and Responsibility, while they have the lowest effectiveness for Efficiency. The policy's improvement focused on the public's low expectations/perceptions and effectiveness awareness, is required in order to develop people-oriented national privacy policy that are satisfied by the people.

An Study on Privacy Policy Research Trend: Focused on KCI Published (개인정보보호정책에 관한 연구동향 고찰: KCI등재지를 중심으로)

  • Bok, Jun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.81-89
    • /
    • 2020
  • Since the Korean privacy policy was legalized in 2011, the related academical researches have been lasted in various fields. Upcoming so-called 3 data laws would be implemented, it is meaningful to review privacy policy studies for exploring future research direction. For this purpose, the total of 146 journals from 2011 to 2019 were reviewed by the content analysis following as research subjects, methodologies and constructions of studies. As results, the numbers of the researches have been conducted on protection policies themselves for improvement, comparing with other countries' policies and also digital finance information protection were deeply discussed. Some of technology based protection applications were experimented and suggested. The major research characteristics was mainly focused on case analysis and criminal laws and policies were developed as protection contingencies. However, most research objects were focused on the protection regulations, not deregulation, therefore, researchers in future study need to explore more digital industry-centric tasks which are practically applied in safer ways. Further, social agreement in using private information will be an essential to prevent indiscriminate use.

Analysis on Information Security Manpower Policy by the Analytic Hierarchy Process (AHP를 이용한 정보보호인력 양성 정책 분석)

  • Kim Tae-Sung;Jun Hyo-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.486-493
    • /
    • 2006
  • As information threats to information systems diffuse, the information security becomes a major concern. Information security manpower who produce and implement information security products, and who are in charge of information security in organizations, has been important. Korean government has implemented various policies to promote the information security manpower. Those policies have been successful to supply enough number of information security manpower, but not successful to supply information security manpower to meet the various requirements of the manpower demand. In this study we adopt analytic hierarchy process(AHP) to analyze the priorities of information security technology categories to meet the demand. Results of the study suggest that the government should concentrate on promotion of manpower for the field of the 'System and Network Security Technology'.

Security Prism : 통계로 알아보는 정보보호 - 점수가 올랐어요

  • 정보보호뉴스 취재팀
    • 정보보호뉴스
    • /
    • s.137
    • /
    • pp.54-57
    • /
    • 2009
  • 방통위가 지난 3월초 우리나라 민간영역의 개인정보보호 수준을 측정한 개인정보보호지수를 발표했다. 개인정보보호지수는 민간부문 의 개인정보보호 수준측정과 정부의 정책성과 평가 및 정책방향 수립 등을 위해 지난 2007년부터 실시한 것으로, 2008년 하반기에 실시한 정보보호 실태조사 결과를 반영해 최초로 공개한 자료다. 이번 자료에 따르면, 2008년 민간영역의 개인정보보호지수는 64.3점으로 2007년 결과인 52.2점에 비해 크게 개선된 것으로 나타났다. 기업 영역 세부지표와 개인영역 세부지표로 구성된 이번 조사결과를 통계를 중심으로 살펴보자.

  • PDF

A Study on the Help for the Victims of Crime -Focusing on the Police Community in Korea- (범죄피해자 보호정책의 결정요인에 관한 연구 -경찰조직을 중심으로-)

  • Ahn, Hwang-Kwon
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.261-288
    • /
    • 2005
  • This paper is concerned on the reality and the effected factors to the help for the victims of crime in the police. In our society the related enacted law and polices for the victim of crime have been practiced, but it was not easy to be helped or supported in some ways. On the contrary the victims have been used as tool of investigation or just the sources of witness on the crime. These days the issue of the victims of crime is one of the most concerned matters to the public, and it turns to on of core issues in the law enforcement community. According to the filed survey for the study, the female and higher level or longer careers than the male and lower level or shorter careers in the police are more positive on the help for the victims of crime. But if the members in the law enforcement community would be trained up with the organized program to fulfill their duties, they could be in positive on the help for the victimes of crime.

  • PDF

A Study on Improvement Plans of SMEs Support Policy for Information Security in Korea (국내 중소기업 정보보호 지원 정책 개선 방안에 관한 연구)

  • Jang, Sang-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.332-339
    • /
    • 2020
  • This study aims to analyze problems and deduce improvement plans for information security support policies for SMEs in Korea. To this end, an effective support policy necessary for reinforcing cyber safety nets to enhance the level of information security of domestic SMEs based on the analysis results by analyzing the status and problems of the previous research review and analysis, the current status of information security of SMEs and the information security support policies of major SMEs at home and abroad. I would like to suggest improvement measures. Reinforcement of awareness, legal basis, voluntary capacity building, joint response system, professional manpower and budget support, cyber security construction, untact era support, and regional strategic industry security internalization were suggested. This can be used as the government's information security support policy to raise the level of information security of SMEs in preparation for the post Covid19.

Access Control System for The Network Resource (네트워크 자원에 대한 액세스 제어 시스템)

  • 박형선;임병렬;김석우;김동규
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.245-254
    • /
    • 1994
  • 본 논문은 네트워크에서 불법적 사용자에 의한 정보의 보호를 위해, 강제적 액세스제어 정책(MAC)과 임의적 액세스 제어 정책(DAC)에 기초하여 네트워크에서의 액세스 제어 정책을 수립하고 이를 UNIX하에서 액세스 제어 리스트(ACL)와 보안 레이블에 기초하여 수행될 수 있도록 설계하고 구현하였다.

  • PDF

RFID/USN 정보보호위협과 대응방안

  • 주학수;권현조;강달천;윤재호;박배효;전길수;이재일
    • Review of KIISC
    • /
    • v.14 no.5
    • /
    • pp.59-68
    • /
    • 2004
  • RFID/USN 개념은 필요한 모든 것(곳)에 RFID 태그를 부착하고 이를 통하여 기본적인 사물의 인식정보는 물론 주변의 환경정보(온도, 습도, 오염정보, 균열정보 등)까지 센싱하여 이를 실시간으로 네트워크에 연결하고, 그 정보를 관리하는 것을 의미한다. 정보통신부는 국민소득 2만 달러 달성을 위한 IT389 정책을 적극적으로 추진하고 있는 가운데 국가차원의 RFID/USN 구축 실행을 위한 마스터플랜을 수립하여 기술개발, 표준화, 정보보호, 산업 적용 및 시범서비스 등의 정책을 실행할 예정이다. 프라이버시 침해문제가 RFID 서비스에서 더욱 이슈화되고 있어 정보보호 문제는 RFID 산업활성화를 위해 반드시 해결하여야 하는 문제이다. 따라서 초경량 암호알고리즘 등 정보보호 핵심기술 확보, RFID/USN 정보보호 인프라 구축, RFID/USN 정보보호 법제도 정비 등 RFID/USN 정보보호정책 추진방안 수립이 필요한 시점이다.