• 제목/요약/키워드: Personal information Technology Level

검색결과 227건 처리시간 0.025초

소비자 특성이 u-헬스케어 서비스 이용의도에 미치는 영향 (The Effects of Consumer Characteristics on the Intention to Use U-healthcare Services)

  • 노미진;박순창;윤경일
    • 한국병원경영학회지
    • /
    • 제15권4호
    • /
    • pp.27-42
    • /
    • 2010
  • The purpose of this study is to investigate the intention to utilize u-healthcare services in Korea. Specifically, this study attempted to identify the relationships among the intention to use u-healthcare, consumer's demographic characteristics, and personal information technology level. We conducted telephone interview and collected data from 406 householders 20 years old or older. The results showed significant differences in use intention of u-healthcare service by innovation, gender, and their interaction term. Residence area and average time of internet use had significant effect on the use intention of u-healthcare service. Also, the interaction term between innovation and education level had a significant effect on use intention. Based on the results we concluded that the consumer's characteristics and information technology level had a significant effect on the use intention of u-healthcare service.

  • PDF

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • 제19권3호
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크 (Risk Analysis for Protecting Personal Information in IoT Environments)

  • 이애리;김범수;장재영
    • 한국IT서비스학회지
    • /
    • 제15권4호
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

병원간호사의 병원정보시스템 활용정도에 영향을 미치는 요인 (Factors Affecting Utilization of Clinical Nurses' Hospital Information System)

  • 김삼숙;주현옥;박인숙
    • 간호행정학회지
    • /
    • 제14권4호
    • /
    • pp.440-447
    • /
    • 2008
  • Purpose: This study was to identify the factors affecting utilization of clinical nurses' hospital information system. Method: Using a convenient sampling, 450 nurses from 9 secondary or tertiary university hospitals in B metropolitan city were selected. Results: The extent that nurses utilize the hospital information system was 3.22 point on average. The hospital information system utilization was positively correlated with personal information utilization skill, information-oriented education, attitude toward computer, and support of the chief manager, while as negatively correlated with the organizational atmosphere. The causal factors of influencing on the hospital information system utilization were personal information technology, education experience of the hospital information system, age, attitude toward computers, education level and support of the chief manager. The total eigenvalue of the variables was 38%. The major variables of influencing on the hospital information system utilization were the personal information technology and education experience of the hospital information system. Conclusions: Thus, nurse managers should provide training courses to improve personal information technology of nurses, and consistently promote them so that nurses can readily apply the hospital information system which have been recently introduced in various ways and thus improve the efficiency of nursing.

  • PDF

제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로 (The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies)

  • 신영진
    • 융합정보논문지
    • /
    • 제11권12호
    • /
    • pp.1-13
    • /
    • 2021
  • 개인정보보호위원회에서 공공기관을 대상으로 시행하고 있는 개인정보 관리수준 진단제도의 지표체계는 「개인정보 보호법」의 법적 준수사항을 점검하지만, 새로운 IT기술의 도입에 따르는 개인정보보호사항을 기준으로 적용하는 데 한계가 있었다. 따라서, 본 연구에서는 제4차 산업혁명의 핵심기술인 빅데이터, 클라우드, 사물인터넷, 인공지능을 특정IT기술의 도입에 따라, 개인정보보호가 강화될 수 있도록 별도의 지표체계가 운영될 수 있도록 지표체계의 개선방안을 제안하고자 한다. 이를 위해서 선정한 특정IT기술의 개인정보보호사항에 관한 국내외 문헌조사를 통해 지표체계의 구성요소를 도출하고, 공공기관의 개인정보 보호담당자 대상으로 한 설문조사 및 개인정보보호 전문가대상으로 FGI/Delphi분석을 통해 진단지표로 선정하였다. 이렇게 선정한 지표체계는 먼저, 모든 특정IT기술의 기획 및 설계단계에서부터 개인정보보호원칙(PbD)과 가명정보처리 및 비식별 조치에 관한 기준의 적용여부를 점검하는 공통지표를 선정하였다. 이외에 빅데이터에 관한 2개 점검항목, 클라우드에 관한 개인정보 처리방침 게재 사항 등 5개 점검항목, 사물인터넷관련 원칙적용, 로그기록 관리 등 5개 점검항목, 인공지능에 관한 원칙 적용 등 4개 점검항목을 선정하였다. 이처럼 본 연구는 개인정보 관리수준 진단제도의 발전을 위해 새로운 IT기술변화에 대응할 수 있도록 개인정보보호의 신속한 대응을 유도하는 진단제도가 되도록 제언하고자 하였다.

Quantizing Personal Privacy in Ubiquitous Computing

  • Ma, Tinghuai;Tian, Wei;Guan, Donghai;Lee, Sung-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권9호
    • /
    • pp.1653-1667
    • /
    • 2011
  • Privacy is one of the most important and difficult research issues in ubiquitous computing. It is qualitative rather than quantitative. Privacy preserving mainly relies on policy based rules of the system, and users cannot adjust their privacy disclosure rules dynamically based on their wishes. To make users understand and control their privacy measurement, we present a scheme to quantize the personal privacy. We aim to configure the person's privacy based on the numerical privacy level which can be dynamically adjusted. Instead of using the traditional simple rule engine, we implement this scheme in a complex way. In addition, we design the scenario to explain the implementation of our scheme. To the best of our knowledge, we are the first to assess personal privacy numerically to achieve precision privacy computing. The privacy measurement and disclosure model will be refined in the future work.

조직성과에 미치는 영향요인에 관한 연구: 정보보호 성숙도의 매개효과를 중심으로 (A Study for Influencing Factors of Organizational Performance: The Perspective of the Mediating Effect of Information Security Maturity Level)

  • 박정국;김인재
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제23권3호
    • /
    • pp.99-125
    • /
    • 2014
  • Internet environment and innovative ICT(information and communication technology) have brought about big changes to our lifestyle and industrial structure. In spite of the convenience of Internet, various cyber incidents such as malicious code infection, personal information leakage, smishing(sms + phishing), and pharming have frequently occurred. Information security must be recognized as a key and compulsory element for surviving in a global economy. Strategic roles of information security have recently been increasing, but effective implementation of information security is still a major challenge to organizations. Our study examines the influencing factors of information security and investigates the causal relationship between information security maturity level and organizational performance through an empirical survey. According to the results of our study, personal, organizational, technical, and social factors affect organizations's information security maturity level altogether. This result suggests that when dealing with security issues, the holistic and multi-disciplinary approaches should be required. In addition, there is a causal relationship between information security maturity level and organizational performance, and organizations aim to establish the efficient and effective ways to enhance information security maturity level on the basis of the results of this study.

지능정보사회의 안전한 인공지능 서비스 구현을 위한 개인정보 침해대응 및 위기관리 컴플라이언스 개발에 관한 연구 (A Study on Developing the Compliance for Infringement Response and Risk Management of Personal Information to Realize the Safe Artificial Intelligence Services in Artificial Intelligence Society)

  • 신영진
    • 융합정보논문지
    • /
    • 제12권5호
    • /
    • pp.1-14
    • /
    • 2022
  • 본 연구는 인공지능 서비스과정에서 개인정보를 포함한 데이터가 처리되고 있고, 그 과정에서 발생 가능한 개인정보 침해사고를 방지하기 위한 해결방안으로 개인정보 침해요인에 대응하는 위기관리 컴플라이언스를 마련하고자 한다. 이를 위해 먼저, 문헌조사 및 전문가 Delphi를 거쳐 처리과정을 범주화를 하였는데, 인공지능서비스 제공과정을 서비스기획·데이터 설계 및 수집과정, 데이터 전처리 및 정제과정, 알고리즘 개발 및 활용과정으로 구분하고, 3개 과정을 9단계의 개인정보처리단계로 다시 세분화하여 개인정보 침해요인을 구성하였다. 둘째, 조사한 개인정보 침해요인을 전문가 대상의 FGI, Delphi 등을 통해 선정하였다. 셋째, 각 개인정보 침해요인에 대한 심각도 및 발생가능성에 대해 전문가대상으로 설문조사하였으며, 94명의 응답결과에 대해 타당성 및 적정성을 검증하였다. 넷째, 인공지능 서비스에서의 개인정보 침해요인에 대한 적절한 위기관리 컴플라이언스를 제시하기 위해, 개인정보의 자산가치, 개인정보 침해요인, 개인정보침해사고 발생가능성을 활용하여 개인정보 침해위험도 산정방식을 마련하였으며, 이를 통해 점수등급에 따라 위험정도에 따른 개인정보 침해사고 대응방안을 제시하였다.

개인정보 암호화 기술에 관한 연구 (Survey on Personal Information Encryption Technology)

  • 김지현;이동훈
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.769-772
    • /
    • 2012
  • 개인정보 보호법 제2조는 개인식별정보, 비밀정보 및 바이오 정보 등을 개인정보로 정의하고 제29조에서 개인정보에 대한 불법열람 및 유출을 방지하기 위해 적정한 수준의 기술적, 관리적, 물리적 안전조치를 취해야 하는 것으로 명시하고 있다. 정보통신망법 제28조 제1항, 시행규칙 제9조, 방송통신위원회 고시에서도 이에 관해 규정하고 있다. 이를 만족하기 위해서 개인정보의 안전성 확보조치를 취해야 하는 공공기관이나 기업들 등의 주체들이 기술적 조치를 적용하고, 이를 지속적으로 운영하고 관리하기 위해 적극적인 방안을 수립하고 실천해 나갈 것이 요구된다. 기술적 안전성 확보는 개인정보에 대한 암호화, 암호화키에 대한 안전한 관리와 운용, 개인정보 열람에 대한 접근제어와 감사를 제공하는 개인정보 보호수준을 도입함으로써 가능하다. 이 논문에서는 개인정보의 기술적 안전성 조치로서 핵심요소인 개인정보의 암호화에 대해서 다양한 기술을 분석하고자 한다. 이는 개인 정보 보호의 기술방안을 선택하는데 있어 도움이 될 수 있을 것이다.

  • PDF

Tacit Knowledge Sharing in Health Industry: Influences of, Personal, Organizational and Social Factors

  • Ghassemzadeh, Hossein;Hojabri, Roozbeh;Eftekhar, Farrokh;Sharifi, Moslem
    • Asian Journal of Business Environment
    • /
    • 제3권1호
    • /
    • pp.29-35
    • /
    • 2013
  • Purpose - objective of this research is to investigate individual, organizational and environmental factors influence tacit knowledge sharing among healthcare professionals. The transmission of Tacit Knowledge is crucial for organizations to ensure that TK will be passed throughout organization, rather than stored in single employee. Research design, data, and methodology - In this study investigate organizational, individual and environmental factors that influence on TK sharing. To test hypothesizes, the survey method was chosen. Sample size was 100 but 74% of questioners returned. Results - The main findings of this research are related to influence of personal, social cultural and behavioral factors on tacit knowledge sharing. According to extracted data all factors have influence on tacit knowledge sharing except Emotional stability that was found to be negatively related to tacit knowledge sharing. That may means anxiety and stress level of workplace applies negative enhance on tacit knowledge sharing. And finally results show that social environment, team oriented culture and organizational commitment have strongest influences on tacit knowledge sharing. Conclusion - the findings of this study shows that personal, social cultural and behavioral factors influence on tacit knowledge sharing. And also indicates that, social and organizational factors enhance strongly on tacit knowledge sharing.

  • PDF