• Title/Summary/Keyword: Privacy Self-Check

Search Result 8, Processing Time 0.028 seconds

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage (안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사)

  • Baek, Mokryeon;Kim, Dongmin;Jeong, Ik Rae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.497-508
    • /
    • 2016
  • With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.

A Study on Personal Information Protection amid the COVID-19 Pandemic

  • Kim, Min Woo;Kim, Il Hwan;Kim, Jaehyoun;Ha, Oh Jeong;Chang, Jinsook;Park, Sangdon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4062-4080
    • /
    • 2022
  • COVID-19, a highly infectious disease, has affected the globe tremendously since its outbreak during late 2019 in Wuhan, China. In order to respond to the pandemic, governments around the world introduced a variety of public health measures including contact-tracing, a method to identify individuals who may have come into contact with a confirmed COVID-19 patient, which usually leads to quarantine of certain individuals. Like many other governments, the South Korean health authorities adopted public health measures using latest data technologies. Key data technology-based quarantine measures include:(1) Electronic Entry Log; (2) Self-check App; and (3) COVID-19 Wristband, and heavily relied on individual's personal information for contact-tracing and self-isolation. In fact, during the early stages of the pandemic, South Korea's strategy proved to be highly effective in containing the spread of coronavirus while other countries suffered significantly from the surge of COVID-19 patients. However, while the South Korean COVID-19 policy was hailed as a success, it must be noted that the government achieved this by collecting and processing a wide range of personal information. In collecting and processing personal information, the data minimum principle - one of the widely recognized common data principles between different data protection laws - should be applied. Public health measures have no exceptions, and it is even more crucial when government activities are involved. In this study, we provide an analysis of how the governments around the world reacted to the COVID-19 pandemic and evaluate whether the South Korean government's digital quarantine measures ensured the protection of its citizen's right to privacy.

CCTV and Privacy - Tools for Security or Eyes of Surveillance? - (CCTV와 프라이버시 - 안전을 위한 도구인가, 감시의 눈인가? -)

  • Lee, Yun-bok
    • Journal of Korean Philosophical Society
    • /
    • v.143
    • /
    • pp.215-244
    • /
    • 2017
  • It is said that we live in an age of technology. And indeed, science and technology do play key roles to our life of happiness, but they are equally central in all events that threaten it. Science and technology are the means we often turn to in seeking solutions to our problems, and in turn are often the apparent sources of new problems. Thus it is not surprising that they have two aspects at the same time. CCTV has been presented to us as a technical solution to security problems. With the help of CCTV, we can more effectively prevent, detect, and prosecute crimes. With the help of CCTV, both public and private spaces can be made more secure. But of course, CCTV also has a down side. The down side most prominently anticipated has been loss of privacy and proliferation of surveillance. It is largely this potential problem with CCTV that has been regulated against. It is said that one reason for imposing a limitation on individual privacy is the societal interest in the prevention of crime. Accordingly a balance between the need to prevent crime through the use of CCTV and the duty to respect the privacy interests of individual citizens is in need of redress. In other hand, two theories of socio-political philosophy may have provided useful ways of understanding the role of CCTV in contemporary society. Firstly, neo-Marxist frameworks, for instance, stress the use of CCTV to police existing unequal socioeconomic divisions within society and the dominance of particular forms of order based upon materialist agendas. Secondly, Foucauldian frameworks contend that Foucault's notion of panoptic surveillance underpinning (self) disciplinary society is an appropriate template for understanding CCTV in late-modern society. In order to find a new point of valance between security and privacy in the use of CCTV, the participation of each citizen in the discourse to make the new norm is necessary. And to prevent its political misuse, their surveillance, or check for the potential surveillance-power is required.

A Case Study for Improvement of Users' Right to Informational self-determination: Focusing on the GDPR of EU and the CCPA of California, USA (국내 기업의 개인정보 자기결정권 강화를 위한 논의: EU의 GDPR과 미국 캘리포니아주의 CCPA를 중심으로)

  • Yoon, Young-Ho;Yoon, Hyun Shik
    • The Journal of Information Systems
    • /
    • v.28 no.4
    • /
    • pp.65-103
    • /
    • 2019
  • Purpose The purpose of this study is to find out in extent to which the companies in Korea and oversea, which has been subjected by different laws of their country, have guaranteed the personal information rights and have provided proper 'right to access' to the information subjects. Design/methodology/approach This study compared Korean laws with 'General Data Protection Regulation (GDPR)' of EU and 'California Consumer Privacy Act (CCPA)' to check each of the level of 'right to access' guarantee. In terms of the difference in guaranteeing the right, this study compared Korean IT leading companies with US global leading IT companies to find out how much 'right to access' are properly implemented in their policies and functions they provide. Findings The result of the study shows that 'right to access' has not been well guaranteed by Korean law, as it does not provide the right to choose method and medium by information subjects and does not clarify the types of diverse information. This was clearly opposite with the other laws providing the right to choose what method and medium that subjects want with clarifying every types of personal information possible to be more. In addition, 'right to access' has not been well guaranteed by Korean companies in comparison with by the oversea companies which proactively guarantee the right by setting the function enabling subjects to browse their information through their websites or applications.

The Influencing Factors forming the Atmosphere of Ward (병실 분위기 조성에 영향을 주는 요인)

  • 윤정인;이미라
    • Journal of Korean Academy of Nursing
    • /
    • v.25 no.4
    • /
    • pp.641-652
    • /
    • 1995
  • Working as nurses, authors found that some patients were not content with their hospital life. Some patients wanted to move to another ward, and others complained about their ward atmosphere. In spite of patients' discomfort, nurses didn't know what made some patients complain about their ward. So, authors tried to find factors that influence atmosphere of hospital wards of the neurosurgery patients. To know the atmosphere of wards, authors selected five neurosurgery ward of a university hospital in Seoul. Observation took a month. An author observed using molar approach, in the morning, in the day time, and in evening time. Authors used concealment /no intervention technique. An author checked condition of people in the wards, and observed their verbal and nonverbal communication behavior their activities and environmental characteristics, and interpreted their meaning through ethnographic research methodology by Spradly. Authors found there was an important factors that influence the atmosphere of ward. It was a human and his attitude. At least one person who was willing to help others made ward atmosphere better. Helping others physically whenever needed, sup-porting the depressed emotionally, offering foods, or talking to others friendly brought good atmosphere. On the contrary, if everyone was indiffernt to others, the atmosphere became cold. Self-centered or selfish behaviors such as occupying too much area, using the toilet too long, covering other's suction bottle without permission and seeing others delicate or urinate were hurtful. In addition to the attitude of patients and their families, unkindness of medical teams including nurses and doctors and tasteless meal caused bad ward atmosphere. Based on this research finding, authors suggest the followings. A For the better atmosphere of ward 1. Nurses should try to make the ward atmosphere better by introducing new patient to older ones. 2. Every ward should have dividing curtains to keep patient's privacy. 3. All hospital personnel should be kind enough to make patients feel that they are repected. 4. Hospital should serve high quality meals to patients. 5. Patients had better stay with those in the similar condition. B. For the future studies 1. Repeated researches are necessary to check reliability of this results. 2. Researches for patients in different area such as ICU, or hemodialysis unit are necessary.

  • PDF