• Title/Summary/Keyword: Personal Information Management

Search Result 1,757, Processing Time 0.028 seconds

A Study on Improvement method of designation criteria for Personal Proofing Service Based on Resident Registration Number (주민등록번호 기반의 온라인 본인확인서비스 기관 지정기준 개선방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.13-23
    • /
    • 2020
  • Currently, online means of replacing resident registration numbers(RRN) include I-Pin, mobile phone, credit card, MyPin, and general-purpose certificate. In order to issue alternative means based on the RRN, it must be designated through the designation review by the Korea Communications Commission(KCC) through a designation review by personal proofing agency and be subject to annual management. However, the criteria for designation and follow-up of the designation of the personal proofing agency carried out by KCC have been used in 2010 without revision, and there are problems that do not conform to the evaluation standards of various alternative means. Therefore, in this paper, we propose a method for improving the designation criteria and management system of the personal proofing service agency. The proposed method analyzes the characteristics of the alternative identification-based personal proofing service and proposes a follow-up management standard that can appropriately evaluate the analyzed characteristics and improves the designation criteria according to the emergence of new alternatives. Through the proposed method, it can be seen that it is possible to strengthen the safety of the personal proofing service based on the alternative means of RRN provided online and face-to-face and to protect the user's personal information.

Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology

  • Kim, Heongkyun;Lee, Sangmin;Kwon, Hyunwoo;Kim, Eunmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4400-4419
    • /
    • 2021
  • In the 4th Industrial Revolution, the healthcare industry is undergoing a paradigm shift from post-care and management systems based on diagnosis and treatment to disease prevention and management based on personal precision medicine. To optimize medical services for individual patients, an open ecosystem for the healthcare industry that allows the exchange and utilization of personal health records (PHRs) is required. However, under the current system of hospital-centered data management, it is difficult to implement the linking and sharing of PHRs in practice. To address this problem, in this study, we present the design and implementation of a patient-centered PHR platform using blockchain technology. This platform achieved transparency and reliability in information management by eliminating the risk of leakage and tampering/altering personal information, which could occur when using a PHR. In addition, the patient-consent system was applied to a PHR; thus, the patient acted as the user with ownership. The proposed blockchain-based PHR platform enables the integration of personal medical information with scattered distribution across multiple hospitals, and allows patients to freely use their health records in their daily lives and emergencies. The proposed platform is expected to serve as a stepping stone for patient-centered healthcare data management and utilization.

A Study on Developing the Compliance for Infringement Response and Risk Management of Personal Information to Realize the Safe Artificial Intelligence Services in Artificial Intelligence Society (지능정보사회의 안전한 인공지능 서비스 구현을 위한 개인정보 침해대응 및 위기관리 컴플라이언스 개발에 관한 연구)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.1-14
    • /
    • 2022
  • This study tried to suggest crisis management compliance to prevent personal information infringement accidents that may occur in the process because the data including personal information is being processed in the artificial intelligence (AI) service process. To this end, first, the AI service provision process is divided into 3 processes such as service planning/data design and collection process, data pre-processing and purification process, and algorithm development and utilization process. And 3 processes are subdivided into 9 stages following to personal information processing stages to infringe personal information. All processes were investigated with literature and experts' Delphi. Second, the investigated personal information infringement factors were selected through FGI, Delphi, etc. for experts. Third, a survey was conducted with experts on the severity and possibility of each personal information infringement factor, and the validity and adequacy of the 94 responses were verified. Fourth, to present appropriate risk management compliance for personal information infringement factors in AI services, a method for calculating the risk level of personal information infringement is prepared by utilizing the asset value of personal information, personal information infringement factors, and the possibility of infringement accidents. Through this, the countermeasures for personal information infringement incidents were suggested according to the scored risk level.

Development of Personal Hypertension Management System Using PDA (PDA를 이용한 개인 심혈관리 시스템 개발)

  • Kwon, Seok-Young;Kwon, Mann-Jun;Park, Kyoung-Soon;Chun, Myung-Geun;Cha, Eun-Jong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.5
    • /
    • pp.718-723
    • /
    • 2007
  • In this paper, we developed a personal hypertension management system (PHMS) having self-diagnosis function with PDA. The developed PHMS consists of five modules such as a personal information management, a life management, a food management, a sickness management, and network management modules. The personal information management module offers physical and fatness information as well as personal information. The life management module gives exercise and body mass index. The food management module includes caloric intake and the sickness management module renders a personal blood pressure and a subjective symptom. Finally, wireless networks are implemented for the network management. From these, it is possible to make a self diagnosis and be examined and treated remotely by sending the stored blood pressure related information to a medical doctor.

Indifference Problems of Personal Information Protection of Social Media Users due to Privacy Paradox (소셜미디어 사용자의 프라이버시 패러독스 현상으로 인한 개인정보 무관심 형태에 대한 연구)

  • Kim, Yeonjong;Park, Sanghyeok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.213-225
    • /
    • 2019
  • Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

The design strategy of accounting information systems for the increase of personal office productivity (개인의 사무생산성 증대를 위한 회계정보시스템 설계방안)

  • 최종민
    • Korean Management Science Review
    • /
    • v.14 no.2
    • /
    • pp.199-223
    • /
    • 1997
  • This paper represents an exploratory effort to test empirically the contingent relationships between the contextual variables, such as user task characteristics and personality, and the information characteristics of Accounting Information Systems (AIS), and to prove the effects of influence factors on the increase of personal office productivity. In this study, it was suggested that personal office productivity is influenced by the fit between the contextual variables and the information dimensions of ALS. It was also proved that influence factors have a positive effect on the increase of personal office productivity.

  • PDF

Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management (국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구)

  • Lee, Sung-Joong;Lee, Young-Jai
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

Implementation of Effective Personal Information Management System For Shopping Mall member management (쇼핑몰 회원 관리를 위한 효율적인 개인정보관리 시스템의 구현)

  • Lee, Kwang-Hyung
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.3
    • /
    • pp.11-18
    • /
    • 2002
  • It is important to maintain the integrity of the personal information stored duplicately in DBs on the internet sites and to reduce the inconvenience of the user's. So it is useful to develop the integrated-DB supporting the independence of the S/W. In this paper, we investigate the defect of the membership management system on the internet site. Based on the result, we model the personal information management system to manage the membership efficiently, and implement the integrated personal information management system, called IPIMS.

  • PDF

A Role-play base Instructional Learning Design for Personal Information Management's Importance:Focus on the third-grade elementary students (개인정보 관리의 중요성을 교육하기 위한 역할 놀이 교수학습 설계 : 부산광역시 초등학생 3학년 대상으로)

  • Kim, Su-Jin;Rim, Hwakyung
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.73-83
    • /
    • 2005
  • Recently, Internet utilization ratio of elementary school students is urgently increasing. On the other hand, elementary school students are not doing personal information management properly in the Internet. As a result, it is causing problem of information leakage. In this paper, we proposed a instructional learning method to teach importance of personal information management to an elementary school student. Proposed method is based on role-play instructional learning method. And applied to the third-year class in elementary school. We show that proposed method is effect in education than traditional teaching method about personal information management's importance.

  • PDF