• Title/Summary/Keyword: Personal Information protection

Search Result 784, Processing Time 0.024 seconds

The Effect on the IS Role Stress on the IS Compliance Intention Through IS Self-determination: Focusing on the Moderation of Person-organization Fit (정보보안 역할 스트레스가 자기 결정성을 통해 준수 의도에 미치는 영향: 개인조직 적합성의 조절 효과)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.375-386
    • /
    • 2022
  • As information asset protection is recognized as an important management factor for organizations, organizations are increasing their investments in information security(IS) policies and technologies. However, strict application of IS may cause non-compliance behavior through IS stress on employees of the organization. Accordingly, this study suggests a mechanism by which employee stress affects IS compliance intentions through self-determination, and a method to reinforce IS compliance intentions through person-organization fit. We conducted an online survey of employees working at companies that adopted IS policies and tested hypotheses using 475 samples. First, as a result of analyzing the main effects of applying the structural equation model, role stress affected IS compliance intention through self-determination. Second, as a result of analyzing the moderating effect of applying Process 3.1, personal organization fit strengthened the relationship between self-determination and IS compliance intention. The research suggests a direction for achieving internal IS goals by confirming the influence of IS stress and behavioral causes of employees.

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

Survey of Institutional Review Board Risk Level Classification of Clinical Trials Among Korean University Hospitals (임상시험심사위원회(Institutional Review Board)의 임상시험에 대한 위험평가 분류조사연구)

  • Lee, Sun Ju;Kang, Su Jin;Maeng, Chi Hoon;Shin, Yoo Jin;Yoo, Soyoung
    • The Journal of KAIRB
    • /
    • v.4 no.2
    • /
    • pp.36-41
    • /
    • 2022
  • Purpose: The purpose of this study is to evaluate how university hospital Institutional Review Boards (IRBs) in Korea classify risk when reviewing clinical trial protocols. Methods: IRB experts (IRB chairman, vice chairman, IRB administrator) in the university hospitals obtaining a Human research protection program (HRPP) or IRB accreditation in Korea were asked to fill out the Google Survey from September 1, 2020 to October 10, 2020. Result: Among the 23 responder hospitals, 8 were accredited by the American Association for Human Research Protection Program (AAHRPP) and 8 were accredited by the HRPP of Ministry of Food and Drug Safety (MFDS). Seven were accredited by Forum for Ethical Review Committees in Asia and the Western Pacific or Korea National Institution for Bioethics Policy. Thirteen of 23 hospitals (56.5%) had 4 levels (less than minimal, low, moderate, high risk), 4 hospitals had 3 levels (less than, slightly over, over than minimal risk), 1 hospital had 5 levels (4 levels plus required data safety monitoring board), and 1 hospital had 2 levels (less than, over than minimal risk) risk classification system. Thirteen of 23 hospitals (56.5%) had difficulty classifying the risk levels of research protocols. Fourteen hospitals (60.9%) responded that different standards among hospitals for risk level determination associated with clinical trials will affect the subject protection. Six hospitals (26.1%) responded that it will not. Three hospitals (13.0%) responded that it will affect the beginning of the clinical trial. To resolve differences in standards between hospitals, 14 hospitals (60.9%) responded that either the Korean Association of IRB or MFDS needs to provide a guideline for risk level determination in clinical trials: 5 hospitals (21.7%) responded education for IRB members and researchers is needed; 3 hospitals (13.0%) responded that difference among institutions needs to be acknowledged; and 1 hospital (4.3%) responded that there needs to be communication among IRB, investigator, and sponsor. Conclusion: After conducting a nationwide survey on how IRB in university hospital determines risk during review of clinical trials, it is reasonable to use 4-level risk classification (less than minimal, low, moderate, high risk); the most utilized method among hospitals. Moreover, personal information and conflict of interest associated with clinical trials have to be considered when reviewing clinical trial protocols.

  • PDF

A Study on the Artificial Intelligence Ethics Measurement indicators for the Protection of Personal Rights and Property Based on the Principles of Artificial Intelligence Ethics (인공지능 윤리원칙 기반의 인격권 및 재산보호를 위한 인공지능 윤리 측정지표에 관한 연구)

  • So, Soonju;Ahn, Seongjin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.111-123
    • /
    • 2022
  • Artificial intelligence, which is developing as the core of an intelligent information society, is bringing convenience and positive life changes to humans. However, with the development of artificial intelligence, human rights and property are threatened, and ethical problems are increasing, so alternatives are needed accordingly. In this study, the most controversial artificial intelligence ethics problem in the dysfunction of artificial intelligence was aimed at researching and developing artificial intelligence ethical measurement indicators to protect human personality rights and property first under artificial intelligence ethical principles and components. In order to research and develop artificial intelligence ethics measurement indicators, various related literature, focus group interview(FGI), and Delphi surveys were conducted to derive 43 items of ethics measurement indicators. By survey and statistical analysis, 40 items of artificial intelligence ethics measurement indicators were confirmed and proposed through descriptive statistics analysis, reliability analysis, and correlation analysis for ethical measurement indicators. The proposed artificial intelligence ethics measurement indicators can be used for artificial intelligence design, development, education, authentication, operation, and standardization, and can contribute to the development of safe and reliable artificial intelligence.

A Study on Improvement of Used-goods Market Platform Using Blockchain (블록체인을 이용한 중고거래 플랫폼 개선방안 연구)

  • Lee, Kyoung-Nam;Jeon, Gyeahyung
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.133-145
    • /
    • 2018
  • This study was investigated the necessity and possibility of using block-chain technology in online used-goods trading platform. Current online used-goods trading platforms operate a safety trading system, but it is difficult to utilize due to relatively high commission rate. As a result, people mainly use the method of meeting and purchasing in person, which is a relatively costly method. This study discusses how to build a platform to solve or mitigate problems such as privacy, information distortion and omission, fraud, etc. In the platform proposed in this study, it is possible to solve the major fraud and personal information protection problems that may occur in the transaction proceeding by appropriately reflecting the types and characteristics of the block-chain technology. In future work, we will discuss legal framework and technology development plan to apply the proposed platform in this study.

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Comparative Analysis of TOA and TDOA method for position estimation of mobile station (이동국 위치 추정을 위한 TOA와 TDOA방법의 비교 분석)

  • 윤현성;이창호;변건식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.3
    • /
    • pp.595-602
    • /
    • 2000
  • This paper is aimed at developing an location tracking system of mobile station based on currently available mobile communication network or mobile Phone and PCS(Personal Communication System). When the location tracking of mobile stations is in services, Emergency-119, all of crime investigation, effective urban traffic management and the safety protection of Alzheimer's patients can be available. In order to track the location of the mobile and base station, assumption in this paper is to use the statistic characteristics of LOS when modeling the standard noise in case that radio path is LNOS environment. The standard variation of the standard noise is $\pm150$. First, location is estimated by the positioning algorithms of TOA and TDOA and compared each other. Second, after canceling the standard noise by Kalman filter, location is estimated by the above two positioning algorithms. Finally, the location by the Kalman filter and two positioning algorithms is estimated by smoothing method. As a result, 2 dimensional average location error is imvoved by 51.2m in TOA and 34.8m in TDOA when Kalman filer and two positioning algorithms are used, compared with the two positioning algorithm used. And there is 3 more meter improvement after smoothing than Kalman filer and two positioning algorithms used.

  • PDF

Security Technique using SSH Tunneling for CCTV Remote Access (SSH 터널링을 이용한 CCTV 원격접속 보안기법)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.148-154
    • /
    • 2016
  • Video security has recently emerged as an important issue owing to CCTV video image spill accidents over the Internet. KISA recommends the use of encryption protocols for remote access through its guidelines for CCTV personal video information protection. But still, many products do not adhere to the guidelines, and those products are easily exposed to security threats, such as hacking. To solve these security vulnerabilities, this paper proposes a CCTV system that connects from remote locations, and is implemented by using secure shell (SSH) tunneling techniques. The system enhances security by transmitting encrypted data by using SSH. By using the tunneling technique, it also solves the problem of not being able to access a CCTV recorder located inside a firewall. For evaluation of the system, this paper compares various CCTV remote access schemes and security. Experimental results on the effectiveness of the system show it is possible to obtain remote access without a significant difference in transmission quality and time. Applying the method proposed in this paper, you can configure a system secure from the threats of hacking.

A Study on the Effect of Block Chain Application and Legal Issue in Logistics Industry (물류산업의 블록체인 적용효과와 법적 과제에 대한 연구)

  • Yang, Jae-Hoon
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.187-199
    • /
    • 2018
  • The purpose of this study is to find out the positive effects of the block chain when applied to the logistics industry and what legal problems should be solved to apply the block chain to the logistics industry. As a result of the study, it was found that the block chain can create the streamlining document work, increasing visibility, improving transaction reliability, activating Internet of things, and expanding smart contract. However, in order to apply the block chain to the logistics industry, have also confirmed that the scope of electronic transactions, international distribution of electronic bill of lading, and legal supplementation related to personal information protection are necessary. It is meaningful to confirm the applicability in the logistics industry, the positive effect and the legal problem, but it is necessary to study the problem from the practical point of view in the hereafter research.

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.