• Title/Summary/Keyword: Personal Policy

Search Result 1,235, Processing Time 0.027 seconds

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

Sensitive Personal Information Protection Model for RBAC System (역할기반 접근제어시스템에 적용가능한 민감한 개인정보 보호모델)

  • Mun, Hyung-Jin;Suh, Jung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the Personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject.

  • PDF

Strengthening User Involvement in Welfare Policies for the Disabled: through Case Studies 'Personal Budgets' of Germany (장애인 복지정책에서의 이용자 참여 강화: 독일의 개인예산제도를 중심으로)

  • Nam, Yong-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.732-742
    • /
    • 2014
  • The provision of welfare services to the disabled in Korea are still insufficient to meet the demand and the delivery system of the service is organized largely from the viewpoint of the suppliers. In order to guarantee the user right to choice, the shift of the policy paradigm supporting autonomy, self-directedness and the right to control of the users appears to be important. The present study explores the theoretical discussion in the field of the welfare of the disabled about user involvement. Then it investigates the German case of 'personal budgets' aimed to strengthen the user involvement and draws some policy implications for Korea. The study confirms that the introduction of 'personal budgets' aimed to realization of the self-determination of the disabled has contributed for the reinforcement of user involvement in welfare policies for the disabled. This new policy program 'personal budgets' based on the idea of the realization of the right to self-determination appears to transform the general nature of the welfare system for the disabled in Germany by transforming the payment methods.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

Analysis of the Effect of Individual and Accident Cause Characteristics on Disaster Safety Perception (개인 및 사고원인 특성이 재난안전인식에 미치는 영향분석)

  • Oh, Hoo;Yim, Dong-Kyun
    • Journal of the Korean Society of Safety
    • /
    • v.36 no.2
    • /
    • pp.80-86
    • /
    • 2021
  • The purpose of this study is to diagnose the level of disaster safety perception (disaster safety importance, accident possibility, personal safety, and regional safety) of local residents, and to analyze the impact of individual and accident cause characteristics. The analysis method used multiple regression analysis, and the main analysis results are as follows. First, disaster safety importance and accident possibility were higher as residents who had experience in safety education and were willing to visit the safety experience center in the province. Second, disaster safety importance was higher as the cause of the accident was the lack of response 119 and police. And accident possibility was higher as the cause of the accident was the lack of prior treatment by the state and local governments. Third, personal safety and regional safety were higher for men, and especially personal safety was lower as residents with children. The results of this study can be used as basic data for establishing regional customized disaster safety policies based on the perception of local residents, who are policy consumers.

A Study on the Improvement of Information Protection Policy to Prevent the Misuse of Personal Information : Based on the Results of the Monitoring Personal Information Misuse in Financial Companies (개인정보 오남용 예방을 위한 정보보호정책 개선에 관한 연구 : 금융회사의 개인정보 오남용 모니터링 결과 중심으로)

  • Kim, Young-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1437-1446
    • /
    • 2019
  • As a result of various personal information leakage incidents, the government implemented enhanced privacy protection measures, and financial companies are making efforts to periodically check whether personal information is misused according to government measures, but the problem of misuse of personal information is still not improved. The purpose of this study is to analyze the results of field experiments using the monitoring system for misuse of personal information and to suggest ways to improve the misuse problem. Based on the specific deterrence theory, this study examined the effects of misuse prevention according to the method of dealing with misusers, and analyzed the relationship between the duties of misusers and their years of service and misuse. It is expected that the analysis results of this study will be used for effective policy establishment.

A Study on the Effects of Fertile Women on the Low Fertility in Korea (한국의 가임여성이 저출산에 미치는 영향연구)

  • Kong, Myeong-Suk
    • Journal of Industrial Convergence
    • /
    • v.13 no.1
    • /
    • pp.25-40
    • /
    • 2015
  • The aim of this study is to a study on the effects of fertile women on the low fertility in Korea. It is designed to research a model and established hypothesis with emphasis on major variables based on theoretical discussions. However, the result of the study is as follows. Firstly, this brought in delivery avoid phenomenon thus resulting in lower delivery phenomenon. The government should propose reasonable solutions to persuade female personal value and important elements of delivery rate at the same time. Secondly, Patriarchal stereotypes weighting household labor to female traditionally pressures working female with double burden as dual stance of work and family worsen the delivery will. Such atmosphere within a family generates female with an ability to get pregnancy to avoid marriage and delivery. Lastly, the research has pointed out the delivery support policy as most ineffective policy among government policies. To solve this problem, the government policy to recover delivery rate must be reviewed continuously and to be exercised immediately.

  • PDF

A Study on Consumer Personal Information in Information Society (정보사회에서의 소비자 개인정보보호에 관한 연구)

  • 남수정;김기옥
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.10
    • /
    • pp.55-66
    • /
    • 1999
  • The purpose of this study is to propose consumer policy related to the protection of personal information on the basis of regulations and laws in the developed countries. From this study, implications for the protection consumer privacy are discussed as follows. First, Consumer education is needed to enhance consumers'knowledge on their privacy right and this should be done not only by private consumer organization but also by businesses. Second, Businesses should realize ethical responsibilities of consumers'privacy right when they use personal information by databasemarketing. Finally, Government should establish a privacy law concerning both public and private sectors.

  • PDF

EU-US Privacy Shield Agreement and Domestic Policy Direction (유럽연합과 미국의 개인정보 이전 협약 (프라이버시 쉴드)과 국내 정책 방향)

  • YUN, Jaesuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1269-1277
    • /
    • 2016
  • European Union and United States have introduced new Privacy Shield agreement after decision of Court of Justice of the European Union which invalidated Safe Harbor agreement. Privacy Shield agreement contains several clauses to raise the level of personal data protection such as enhanced commitments, stronger enforcement, clear safeguards and transparency obligations, and effective protection of EU citizens' rights with several redress possibilities. This agreement has received positive response as an enhanced measure for personal data protection. This paper examines EU and US discussion history and current situation regarding Privacy Shield and suggests national policy direction such as measures for personal data transborder flow system improvement and international cooperation.

The Mediating Effect and Moderating Effect of Pseudonymized Information Combination in the Relationship Between Regulation Factors of Personal Information and Big Data Utilization (개인정보 규제요인과 빅데이터 활용간의 관계에서 가명정보 결합의 매개효과 및 조절효과)

  • Kim, Sang-Gwang
    • Informatization Policy
    • /
    • v.27 no.3
    • /
    • pp.82-111
    • /
    • 2020
  • Recently, increasing use of big data have caused regulation factors of personal information and combination of pseudonymized information to emerge as key policy measures. Therefore, this study empirically analyzed the mediating effect and moderating effect of pseudonymized information combination as the third variable in the relationship between regulation factors of personal information and big data utilization. The analysis showed the following results: First, among personal information regulation factors, definition regulation, consent regulation, supervisory authority regulation, and punishment intensity regulation showed a positive(+) relationship with the big data utilization, while among pseudonymized information combination factors, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination were also found to be in a positive relationship with the use of big data. Second, among the factors of pseudonymized information combination, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination showed a positive(+) mediating effect in relation to regulation factors of personal information and big data utilization. Third, in the relationship between personal information regulation factors and big data utilization, the moderating effect hypothesis that each combination institution type of pseudonymized information (free-type, intermediary-type, and designated-type) would play a different role as a moderator was rejected. Based on the results of the empirical research, policy alternatives of 'Good Regulation' were proposed, which would maintain balance between protection of personal information and big data utilization.