• Title/Summary/Keyword: 정보보호의식

Search Result 122, Processing Time 0.03 seconds

Factors Influencing Patient Privacy Protection Behavior among Nursing Students (간호대학생의 환자 프라이버시 보호행동 영향요인)

  • Lee, Eun Joo;Shin, Hyun Sook;Ha, Eun Chae
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.3
    • /
    • pp.225-234
    • /
    • 2018
  • Purpose: The purpose of this study was to identify factors influencing patient privacy protection behavior among nursing students and examine the relationships between these factors. Methods: Participants in this study were 144 nursing students who have experienced clinical practice. The data were analyzed using descriptive statistics, one-way ANOVA, Scheffe test, Pearson's correlation coefficient, and multiple regression with IBM SPSS Win 23.0 program. Results: Professional self-concept and ethical values were factors influencing patient privacy protection behavior among nursing students. These variables explained 21.9% of the variance for patient privacy protection behavior. A higher level of patient privacy protection behavior was associated with higher levels of professional self-concept and ethical values. Conclusion: The findings demonstrate that strategies for enhancing patient privacy protection behaviors of nursing students should include methods for forming images of positive nurses and firming ethical values.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Verification of Human Error Factors for Access Control of Bodyguards through Multiple Risk Case Analysis

  • Kim, Jin-Hwan;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.143-150
    • /
    • 2020
  • The purpose of this study is to investigate the human error of bodyguards caused in the process of performing access control activities between security missions, focusing on multiple risk cases, and to suggest countermeasures accordingly. To verify this, after arranging the sequence of events in a time series, the VTA technique and Why-Why analysis technique that can easily identify the problem centered on the variable node were used. In addition, environmental factors and personal factors that cause human errors were extracted through M-SHEL Metrix. As a result of analyzing multiple risk cases through such a method, the security environment factors that cause access control accidents include lack of time (impatience), prejudice against visitors, intensive work methods, lack of security management, unattended travel, and familiar atmosphere. (Relaxation), formal work activities, convenience provision, and underestimation were surveyed. In addition, human errors caused by personal security guards were investigated as low alertness, formal work, negligence of inspection, and comfortable coping.

A Case Study on Corporate Social Responsibility(CSR) of Domestic Cosmetics Companies (국내화장품기업의 사회공헌활동(CSR)에 대한 사례분석)

  • Yoon, Jin-Suk;Lee, Jae-Ha
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.219-228
    • /
    • 2018
  • The purpose of this study is to analyze the cases of social contribution activities of cosmetics companies and to suggest directions for related activities to be continued more effectively in the future. The case was analyzed through the report, public information, and interview with the person in charge. The main results derived from previous studies and case studies. First, social contribution activities of cosmetics companies are performed in a variety of ways such as education, business, medical care, health, environmental protection, culture, art, donation etc. Second, corporate social contribution activities and diversity were found to be highly correlated with firm size. Third, the effectiveness of social contribution activities can be enhanced through collaboration with social enterprises and professional organizations. Forth, strategic approach to social contribution activities, systematic public relations, and CEO's sense of responsibility have a major influence on related activities. Based on the results of this study, it has been suggested that CSR activities of cosmetics companies can be made more effective.

A Study on the Plans to Promote Local Newspapers (지역신문 활성화방안에 관한 연구: 정책 및 법제 차뭔을 중심으로)

  • Choi, Kyung-Jin
    • Korean journal of communication and information
    • /
    • v.25
    • /
    • pp.163-187
    • /
    • 2004
  • Recognizing the contemporary critical situation of local newspapers in Korea, the present study purposed to consider plans to overcome such a crisis from various aspects and examine the possibility to implement the plans. Specific research question was plans to promote local newspapers on political and legislative dimension. The result of this study proved that the issue of activating local press must be discussed basically in conjunction with the implications and functions of power decentralization. This study also considered the opinion that so-called structural problems, which cannot be tackled by local newspaper, must be intervened in by the government on the dimension of promoting local newspapers politically and legislatively. In particular, the meaning of this study lies in that it was focused on supporting methods to prepare a bill for the special law of local newspaper promotion support, and proposed specific and practical plans.

  • PDF

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

U.S. FOIA(FREEDOM OF INFORMATION ACT) AND ACCESS TO INFORMATION AFTER 9/11 TERRORIST ATTACKS (9/11 테러 이후 강화된 미국 연방정부의 국가안보 정책이 정보자유법 (Freedom of Information Act) 및 연방 정보공개정책에 미친 영향)

  • Kwon, Hyuck-Bin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.365-392
    • /
    • 2009
  • The increased concern about national security in the U.S. after the 9/11 terrorist attacks has influenced public rights of access to government information and its legal foundation, the Freedom of Information Act (FOIA). Public access to government information has been restricted at the policy level by a series of legislative and executive changes in FOIA after September 11, 2001, but the examination of statistics on FOIA implementation between fiscal years 1999 and 2004 shows that the strengthened national security measures did not have a considerable impact at the implementation level during this period. These contrasting findings might be due to the public officials' informal reaction to the criticism of the restriction on public access, bureaucratic inertia, and the use of new record categories not subject to FOIA.

  • PDF

A Comparative Study on the Regulation System of Public Sphere in the Social Media Space During the Election Campaign (소셜 미디어 관련 온라인 선거 공론장 규제체계 비교연구)

  • Lee, Dong-Hoon;Ryu, Jung-Ho;Jung, Soo-Young
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.74-99
    • /
    • 2011
  • This article tries to find out some regulatory facts to improve and vitalize roles of social media such as facebook, twitter, etc in the election campaign. For this goal, a theoretical approach is based on the agnostic and open aspects of the regulation system of election. Case study and in-depth interview were used as research methods in this article. The results are as follows. First, some differences are in the election regulatory system regarding the roles of social media in UK, US, Japan and Korea. The election public sphere systems of these countries categorized to the types of legal factors to control political communications in election public sphere; free-speech oriented system(UK. US), limited free-speech oriented system(Korea), normative-oriented system(Japan). Second, most respondents answered they agreed with some improvement ideas to reflect needs of netizen and academic who suggest to minimize regulatory burdens on social media in the political communication during the election campaign.

  • PDF

A Study on the Effective Guarantee of the Right to Portability of Personal Health Information (개인건강정보 이동권의 실효적 보장에 관한 연구)

  • Kim, Kang Han;Lee, Jung Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.2
    • /
    • pp.35-77
    • /
    • 2023
  • As the amendment to the Personal Information Protection Act, which newly established the basis for the right to request transmission of personal information, was promulgated through the plenary session of the National Assembly, MyData, which was previously applied only to the financial sector, could spread to all fields. The right to request transmission of personal information is the right of the information subject to be guaranteed for the realization of MyData. However, since the right to request transmission of personal information stipulated in the Personal Information Protection Act is designed to be applied to all fields, not a special field such as the medical field, it has many shortcomings to act as a core basis for implementing MyData in Medicine. Based on this awareness of the problem, this paper compares and analyzes major legal trends related to the right to portability of personal health information at home and abroad, and examines the limitations of Korea's Personal Information Protection Act and Medical Act in realizing Medical MyData. Under the Personal Information Protection Act, the right to request transmission of personal information is insufficient to apply to the medical field, such as the scope of information to be transmitted, the transmission method, and the scope of the person obligated to perform the transmission, etc.. Regulations on the right to access medical information and transmission of medical records under the Medical Act also have limitations in implementing the full function of Medical My Data in that the target information and the leading institution are very limited. In order to overcome these limitations, this paper prepared a separate and independent special law to regulate matters related to the use and protection of personal health information as a measure to improve the legal system that can effectively guarantee the right to portability of personal health information, taking into account the specificity of the medical field. It was proposed to specifically regulate the contents of the movement and transmission system of personal health information.