• Title/Summary/Keyword: Confidentiality Protection

Search Result 95, Processing Time 0.019 seconds

A Study on Policy Improvement for Ensuring the Effectiveness of Suicide Prevention Law (「자살예방 및 생명존중 문화 조성을 위한 법률」의 실효성 확보를 위한 정책적 개선 방안 - 「개인정보보호법」과의 충돌문제 해결을 중심으로 -)

  • Kwon, Do-Hyun;Park, Jong-Ik;Ah, Yong-Min
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.261-285
    • /
    • 2019
  • The essential policy of suicide prevention is to continuously manage and treat suicide attempted people through data base related to suicide retry rate and follow-up study report. In Korea, only few people are allowed to follow-up by the Personal Information Protection Act. As a result, the research participation rate and the service participation rate are rather low, so that the research participants is limited to a part of the suicide attempted people. Therefore, the policy proposals to be improved in the Ministry of Health and Welfare Act were examined comparatively in order to increase the practical utilization of the suicide prevention about Article 14 and Article 20 of the Suicide Prevention Act. As a criterion for policy improvement, measures for non-discrimination of information to be considered in terms of technical and ethical dimensions and non-profit research and medical information for medical purposes were suggested. In addition to the severity of the suicide, the suicide risk was assessed and the criteria for the objective assessment of the follow-up observation were considered in consideration of the severity of the suicide.

The Study on the Characteristics of Technology Innovation Activities of High Growth Firms (고성장기업의 기술혁신활동 특성에 대한 연구)

  • KIM, HYEON-CHANG
    • Journal of Korea Technology Innovation Society
    • /
    • v.22 no.1
    • /
    • pp.28-49
    • /
    • 2019
  • This paper explores the characteristics of innovation activities in high growth firms that contribute to national and regional economic growth and job creation. The analysis is based on the 2016 KIS data to analyze the difference in innovation activities between high growth firms and general firms. The main results are as follows: First, high growth firms have a higher proportion of R&D personnel than general firms. Second, high growth firms are actively introducing product innovation, process innovation, and organizational innovation as compared to general firms. In the innovation activities related to product innovation and process innovation, there is no statistically significant difference between high growth companies and general companies except for external R&D. Third, High growth firms are more likely to cooperate with other technology partners than general firms. But, there is no statistically significant difference between high growth firms and general firms in the external knowledge search and the diversity of cooperating partners. Fourth, in terms of protecting innovation, high growth firms are more likely to use all kinds of innovation protection method, such as 'utilizing intellectual property rights', 'maintaining confidentiality', 'adopting complex design methods', 'market preemption ahead of competitors', and the most important means is the intellectual property rights. Fifth, government innovation policies that high growth firms chose as important are 'innovation subsidies and loans', 'acquirement, utilization and protection of intellectual property rights' and 'human resource support'.

Analysis of the Effects of Common Criteria Certification on the Information Security Solutions (CC인증이 정보보호 솔루션의 보안성에 미치는 영향 분석)

  • Hong, Young Ran;Kim, Dongsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.57-68
    • /
    • 2012
  • As the functions and technology of IT security solution has been diversified and complicated, it is necessary to make the functions standardized. The common criteria (CC) evaluation and certification scheme was introduced with this background in 2000. For over 10 years after the introduction of CC evaluation and certification scheme, many security solution vendors have developed functions following the security functional requirement in CC. Most of CC evaluators and developers think that CC has helped to enhance the security of the solution. So, it is a right time to prove the affirmative effects of CC in quantity. In this research, we compare two cases, the security status of the solution before and after the experience of CC evaluation, and analyze the results. We made the questionnaire for the domestic solutions vendors. We show that CC has made positive effects on the security of the solution quantitatively using statistical analysis. This research is meaningful security enhancement of domestic security solutions.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.