• Title/Summary/Keyword: Information and Personal-based Consulting

Search Result 14, Processing Time 0.025 seconds

A Study on Information Security Consulting Method according to Type of Company (기업 업종에 따른 정보보안컨설팅 방법 연구)

  • Lee, Su-youn
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.121-126
    • /
    • 2015
  • Exposure of personal information that is held by hacking accident near the company has led to severe water level. And, it has changed security threat elements generated according to businessenterprise. Therefore, in this paper, I looked at security threat elements and proposed the way of appropriate information security consulting according type of company. First, In the financial and insurance industries, and should not have been compromised by a worm virus infection due to lack of awareness inside of members, by collectively apply in the same way the internal security standards of the organization to members, the risk of customer information. It shall be provided in advance that the security accident occurs due to a higher job group. Therefore, information security consulting method based on people and information is applied. Secondly, in industry of company, to perform consulting information security based on the attributes of the case industry groups.

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

Reference Model and Architecture of Interactive Cognitive Health Advisor based on Evolutional Cyber-physical Systems

  • Lee, KangYoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4270-4284
    • /
    • 2019
  • This study presents a reference model (RM) and the architecture of a cognitive health advisor (CHA) that integrates information with ambient intelligence. By controlling the information using the CHA platform, the reference model can provide various ambient intelligent solutions to a user. Herein, a novel approach to a CHA RM based on evolutional cyber-physical systems is proposed. The objective of the CHA RM is to improve personal health by managing data integration from many devices as well as conduct a new feedback cycle, which includes training and consulting to improve quality of life. The RM can provide an overview of the basis for implementing concrete software architectures. The proposed RM provides a standardized clarification for developers and service designers in the design and implementation process. The CHA RM provides a new approach to developing a digital healthcare model that includes integrated systems, subsystems, and components. New features for chatbots and feedback functions set the position of the conversational interface system to improve human health by integrating information, analytics, and decisions and feedback as an advisor on the CHA platform.

Prioritize Security Strategy based on Enterprise Type Classification Using Pair Comparison (쌍대비교를 활용한 기업 유형 분류에 따른 보안 전략 우선순위 결정)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.4
    • /
    • pp.97-105
    • /
    • 2016
  • As information system is getting higher and amount of information assets is increasing, skills of threatening subjects are more advanced, so that it threatens precious information assets of ours. The purpose of this study is to present a strategic direction for the types of companies seeking access to information security. The framework classifies companies into eight types so company can receive help in making decisions for the development of information security strategy depending on the type of company it belongs to. Paired comparison method survey conducted by a group of information security experts to determine the priority and the relative importance of information security management elements. The factors used in the security response strategy are the combination of the information security international certification standard ISO 27001, domestic information protection management system certification K-ISMS, and personal information security management system certification PIMS. Paired comparison method was then used to determine strategy alternative priorities for each type. Paired comparisons were conducted to select the most applicable factors among the 12 strategic factors. Paired comparison method questionnaire was conducted through e-mail and direct questionnaire survey of 18 experts who were engaged in security related tasks such as security control, architect, security consulting. This study is based on the idea that it is important not to use a consistent approach for effective implementation of information security but to change security strategy alternatives according to the type of company. The results of this study are expected to help the decision makers to produce results that will serve as the basis for companies seeking access to information security first or companies seeking to establish new information security strategies.

A Balance of Primary and Secondary Values: Exploring a Digital Legacy

  • Cushing, Amber L.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.2
    • /
    • pp.67-94
    • /
    • 2013
  • This exploratory research explores the concept of a digital legacy as a general concept and as a collection of digital possessions with unique characteristics. The results reported in this article are part of a larger study. In Cushing (2013), the author identified the characteristics of a digital possession. In this study, these characteristics of a digital possession were utilized to explore how the characteristics of several digital possessions could form a collection, or a digital legacy. In addition to being explored as a collection of digital possessions, data was collected about the general concept of a digital legacy. In part I of the study, 23 participants from three age groups were interviewed about their general concept of a digital legacy. Five general characteristics describing a digital legacy were identified. In part II of the study, interview data from Cushing (2013) was used to create statements describing digital possessions. The statements were classified utilizing the archival concept of primary and secondary values, as well as the consumer behavior concepts of self extension to possessions and possession attachment. Primary value refers to the purpose for which the item was created, while secondary value refers to an additional value that the participants can perceive the item to hold, such as a perception that an item can represent one's identity. Using standard Q method procedure, 48 participants were directed to rank their agreement with 60 statements (written on cards), along a distribution of -5 to +5, according to the characteristics of the digital possession they would most like to maintain for a digital legacy. The ranked statements were analyzed using Q factor analysis, in order to perceive the most common statements associated with maintaining digital possessions for a digital legacy. Q method results suggested that most individuals described the digital possessions they wanted to maintain for a digital legacy using various combinations of characteristics associated with primary and secondary values. This suggests that while some participants will respond to personal archiving based on the concept of preserving identity (a perceived secondary value), this will not appeal to everyone. Information professional could consider this difference in appeal when marketing personal archiving assistance to patrons.

A Study on Regulations Status and Improving of Municipalities by Privacy Type (개인정보보호 유형에 따른 지자체 조례현황 및 개선방안 연구)

  • Yoo, Jung-Hoon;Han, Keunhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.331-342
    • /
    • 2015
  • In this paper, Seoul(25 regions), Jeonbuk(14 regions), Busan(16 regions) of 277 agencies for the based local governments were selected and reviewed an ordinance status and related laws. Based on information systems of self-regulation, the ordinance within the self-regulation for each region is being operated in the annexed form analyzed by the survey. A total of four categories(resident registration numbers, cell phone number, home number, income) by reference to the part that refused to disclose personal information, the survey analysis. Through this, The government manager who is frequently job rotation and consulting staff can understand and review the regulations by proposing the improving solution of the municipal rules. In addition, I suggested control item addition so that they can facilitate the municipal format revised review and verify the annexed form using Personal Information Management System.

Segmenting Korean Millennial Consumers of Sharing Economy Services on Social Networking: A Psychographic-based Approach (소셜 네트워크 기반 공유경제 서비스에 관한 밀레니얼스 소비자 세분화 연구: 사이코그래픽 관점에서)

  • Lee, Jae Heon;Choi, Jae Won;Kim, Ki Youn
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.109-121
    • /
    • 2015
  • The purpose of this qualitative study is to explore consumer behavioral trends, psychological characteristics and various cognitive types of Millennial Generation consumers, primarily in their 20s, who are familiar with sharing economy services based on the emerging social networking technology. Using Q methodology, this paper theoretically defines four and interprets via a social science perspective four different types of these young consumers who are skilled at state-of-the-art ICT equipment, devices or online networking services. Sharing economy services in Korea's academic and industrial services are influenced by government policy, and related research is relatively new. This study is focused on discovering unique psychographic characteristics called 'schemata' that include personal interest, preference, attitude, and opinion. On the basis of 40 Q-sorted data samples, the analysis examined 180 collected statements from meta-studies and interviews with 35 individuals born between 1997 and 1992. As a result, four consumer groups were identifies: Type 1 'Early majority', Type 2 'Laggard', Type 3 'Opinion leader', and Type 4 'Late majority'. The results of this research can be used to explore to study in greater detail the behavior and psychological aspects of Millennial General consumers'.

A Study on Health Information and Medical Consulting via Internet Focusing on the Age Group of 20s (인터넷을 활용한 건강정보 및 의료상담에 관한 연구 (20대를 중심으로))

  • Rhee, Hyun-Sill;Lee, Kyung-Sook;Kim, Mi-Sun;Hwang, Seung-Hwan;Kim, Dong-Soo;Woo, Jong-Won;Mun, Dae-Hun;Ryu, Jin-Sol;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.255-267
    • /
    • 2012
  • High Internet usage and the public's keen interest on health have influenced the health care system, and a potential value of the online health information and medical consultation market is immense. This study reveals results from data collected from Seoul residents in the age group of 20s in 2011. Out of 499 respondents, 75.2% answered that they used online health information; however, only 7.2% answered that they have used online medical consultation services. Findings on the purposes of using online medical consultation included treatments of symptoms(33.6%) and self-disciplines of one's health(19.5%). Mostly used Websites for health information search included search engines and blogs, but respondents preferred to use government sites and hospital sites in the future. When choosing a medical consultation, respondents preferred a certain website for different reasons including creditability of the consultant(23.7%), creditability of the organization(23.7%), rapid responses(21.2%), and more. Overall, although health information search via web is being highly utilized among people in their 20s, utilization of online medical consulting is not. Thus, promotion efforts to increase awareness and utilization of online medical consulting based on the site selection criteria, type of personal information disclosure, and other preferences are essential. Also, creating websites meeting these criteria is important.

An Empirical Study on Selling Process Reengineering Success Model (판매 프로세스 혁신의 성공모형에 대한 실증연구)

  • Kim, Gyeung-Min;Bang, So-Yeon
    • Information Systems Review
    • /
    • v.10 no.1
    • /
    • pp.1-20
    • /
    • 2008
  • One of the major applications of CRM systems is to integrate and automate selling processes. CRM systems provide sales people with tools and data sources they need to reengineer their selling processes. In the industry where sales are traditionally based on personal relationships and the use of the CRM systems is voluntary, the installation of technical solutions does not guarantee Selling Process Reengineering (SPR). The objective of this study is to investigate (1) organizational factors that influence CRM use by sales personnel; and (2) the mediation effect of CRM system use on SPR success when system use and process reengineering are voluntary rather than institutional. Understanding the determinants of voluntary CRM system use and SPR success provide valuable guidance for managers. Managers can benefit from this study by focusing on improving the factors that affect voluntary CRM system use and SPR success.