• Title/Summary/Keyword: data protection policy

Search Result 350, Processing Time 0.025 seconds

The Status and Suggestions for Big Data Adaptation in the Government and the Public Agency (정부 및 공공기관에서의 빅데이터 활용에 대한 현황 및 실행방안 제안)

  • Byeon, Hyeon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.13-25
    • /
    • 2017
  • Volume in data storage is growing more than ever before. This phenomenon is caused by the participation of governments and firms as well as general users. As for big data, governments and public agencies are likely to play important roles in applications since they can access and operate personal data for public purposes. In this study, the author examined the status and countermeasure of big data from different countries and drew some common grounds. The suggestions are as follows. First of all, securing manpower and technology have to take precedence. In addition, share and development between the government and the private sector are required. And organizations should come up with long-term strategies along with the development of data loading and analysis. In conclusion, the author propose the recognition of the importance of data management, privacy protection and the expansion of field application possibilities for political usage of big data.

A Thought on the Right to Be Forgotten Articulated in the European Commission's Proposal for General Data Protection Regulation (유럽연합(EU) 정보보호법(General Data Protection Regulation)개정안상의 잊혀질 권리와 현행 우리 법의 규율 체계 및 앞으로의 입법방향에 관한 소고)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.87-92
    • /
    • 2012
  • In the early 2012, European Union proposed new legal framework, including the right to be forgotten, for the protection of personal data. The new Proposal articulates kind of sweeping new privacy right and there has been debates on its potential threat to free speech in the digital age. While the situation is similar in Korea, I want to introduce the right to be forgotten in the Proposal. Then, I will analyze current legal system in Korea regarding the new privacy right and suggest some guidelines in searching direction for the coming legislation with respect to the right to be forgotten. The right to be forgotten should not have been promulgated without considering fully its effect on the free speech, especially in the society where the voice toward direct democracy or movement toward participation of the citizen, mainly through cyber space or Social Network Services, has risen much higher in Korea. Especially, the new right seems not to cover the control of data subject on a third party where the third party expressing his opinion by posting himself other's personal data on his blog or others.

Internet Governance in the light of Human Rights (인권적 관점에서 본 인터넷 거버넌스)

  • Park, Seong Hoon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.52-57
    • /
    • 2013
  • Information and Communication Technologies(ICTs) have substantially enlarged both the opportunities to realize one's human rights but have also resulted in the emergence of new challenges. ICTs are so deeply embedded and cental to almost all aspects of human activity. And ICTs are assuming an increasingly central role in all aspects of human and societal development across the world. But this is especially true of the right to privacy, which faces challenges such as profiling and data mining for public(including national security) and private purposes. ICTs access is a fundamental right for all humans in the information age. So we have need for regulation based on human rights in the digital age. And governments have a responsibility to protect individuals against violations of human rights and data protection by public authorities, but also by private entities. In addition, internet governance and multi-stakeholder principle have to be stressed on all of the internet issues because internet governance is included in the principle of democracy which have bottom-up communication and equality. So it is very importance that Internet Governance Forum is the space for a meaningful discussion on public policy issues relating to the internet.

  • PDF

Review of Artificial Intelligence Platform Policies and Strategies in South Korea, United States, China and the European Union Using National Innovation Capacity

  • Park, Mun-Su;Chang, Soonwoo Daniel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.3
    • /
    • pp.79-99
    • /
    • 2022
  • South Korea is at an important juncture in its history to decide whether to continue its investment to become a first-mover of artificial intelligence (A.I.) platform technology or stay as a fast follower. This paper compares South Korea's A.I. platform capacity to that of the United States, China and the European Union by reviewing publicly opened documents and reports on AI platform strategies and policies using the three elements of the national innovation capacity: common innovation infrastructure, cluster-specific conditions, and quality of linkages. This paper found three major areas the South Korean government can focus on in the A.I. platform industry. First, South Korea needs to increase its investment in the A.I. field and expand its public-private collaboration activities. Second, unlike the U.S. and the U.K., South Korea lacks data protection policies. Third, South Korea needs to build a high-performance system and environment to experiment with artificial intelligence technology and big data.

International Comparison between Korea and Other Countries, in Terms of Retail Regulations

  • Cho, Young-Sang;Kwak, Young-Arm
    • Journal of Distribution Science
    • /
    • v.15 no.9
    • /
    • pp.5-16
    • /
    • 2017
  • Purpose - This research is to provide new insights for policy makers in Korea, comparing South Korea and foreign countries such as Japan, UK, France, Germany, Netherlands, Sweden, Spain and the forth, in terms of the effects of retail regulations on a retail trade industry. Research design, data, and methodology - After introduction, the research begins with literature review on the background why advanced countries have introduced retail legislations, then, will present their effects. The fourth section will compare the South Korea with the above foreign countries. Finally, the authors will draw conclusions and mention not only research limitations but also future research directions. Results - Based on the previous research, the authors compared Korea and advanced countries, in terms of how retail regulations influence retail employment, retail productivity, retail price, and the protection of independent retailers. The authors found that industrialized countries have made a significant effort to protect small shops for social stability with many different regulations and/or budget. With regard to results, however, the degree of its achievement is lower than expected. Conclusions - In order to protect small- and medium-sized retailers efficiently and effectively, policy makers need to develop better sophisticated retail regulations than those of advanced countries.

A Study on Improvement of Management Framework for Coastal Erosion Protection (연안침식방지를 위한 관리체계 개선방안)

  • Lee, Moon-Suk;Park, Seong-Wook
    • Ocean and Polar Research
    • /
    • v.29 no.2
    • /
    • pp.155-165
    • /
    • 2007
  • Recently, coastal erosion has become an important issue in relation to keeping territorial integrity of a nation as well as protecting the coastal marine ecosystem. This study examines some apprehensions about the effectiveness of the existing legal system concerning prevention of coastal erosion. After examining several case studies in Scotland, the USA, and the Netherlands, this study proposes appropriate revisional legal measures that can be applied in Korea: first, the coastal management act should be revised for stronger, enforceable and practical legal grounds emphasizing minimal coastal erosion; second, the proposed "Comprehensive Coastal Erosion Prevention Plan" should be established and implemented in four steps such as characterization of issues through surveys of stakeholders and demand assessment, plan establishment, execution, and maintenance and management; third, there is a demand to establish and implement a legal framework to support monitoring activities which provide important data and information to prevent coastal erosion; fourth, the chronic region of damage is designated as the "Vulnerable Area" to be protected and managed accordingly; fifth, the "Coastal Coordination council" is established and operated for developing an integrated coastal management policy and visions for sustainable coastal zone, as well as coordinating and intervention of any activities which may cause coastal erosion.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

Artificial Intelligence and Blockchain Convergence Trend and Policy Improvement Plan (인공지능과 블록체인 융합 동향 및 정책 개선방안)

  • Yang, Hee-Tae
    • Informatization Policy
    • /
    • v.27 no.2
    • /
    • pp.3-19
    • /
    • 2020
  • Artificial intelligence(AI) and blockchain are developing as the core technology leading the Fourth Industrial Revolution. However, AI is still showing limitations in securing and verifying data and explaining the evidence for the results, and blockchain also has some drawbacks such as excessive energy consumption and lack of flexibility in data management. This study analyzed technological limitations of AI and blockchain and convergence trends to overcome them, and finally suggested ways to improve Korea's related policies. Specifically, in terms of R&D reinforcement, we proposed 1) mid- and long-term AI /blockchain convergence research at the national level and 2) blockchain-based AI data platform development. In terms of creating an innovative ecosystem, we also suggested 3) development of AI/blockchain convergence applications by industry, and 4) Start-up support for developing AI/blockchain convergence business models. Lastly, in terms of improving the legal system, we insisted that 5) widening the application of regulatory sandboxes and 6) improving regulations related to privacy protection is necessary.

Enhanced Privacy Preservation of Cloud Data by using ElGamal Elliptic Curve (EGEC) Homomorphic Encryption Scheme

  • vedaraj, M.;Ezhumalai, P.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4522-4536
    • /
    • 2020
  • Nowadays, cloud is the fastest emerging technology in the IT industry. We can store and retrieve data from the cloud. The most frequently occurring problems in the cloud are security and privacy preservation of data. For improving its security, secret information must be protected from various illegal accesses. Numerous traditional cryptography algorithms have been used to increase the privacy in preserving cloud data. Still, there are some problems in privacy protection because of its reduced security. Thus, this article proposes an ElGamal Elliptic Curve (EGEC) Homomorphic encryption scheme for safeguarding the confidentiality of data stored in a cloud. The Users who hold a data can encipher the input data using the proposed EGEC encryption scheme. The homomorphic operations are computed on encrypted data. Whenever user sends data access permission requests to the cloud data storage. The Cloud Service Provider (CSP) validates the user access policy and provides the encrypted data to the user. ElGamal Elliptic Curve (EGEC) decryption was used to generate an original input data. The proposed EGEC homomorphic encryption scheme can be tested using different performance metrics such as execution time, encryption time, decryption time, memory usage, encryption throughput, and decryption throughput. However, efficacy of the ElGamal Elliptic Curve (EGEC) Homomorphic Encryption approach is explained by the comparison study of conventional approaches.

A Study on the Improvement of the Legal System for the Promotion of Opening and Utilization of Open Government Data - Focusing on cases of refusal to provide - (공공데이터의 개방·활용 촉진을 위한 법제도 개선방안 연구 - 공공데이터 제공거부 사례를 중심으로 -)

  • Kim Eun-Seon
    • Informatization Policy
    • /
    • v.30 no.2
    • /
    • pp.46-67
    • /
    • 2023
  • There are criticisms that, despite the proactive government policy on open government data (hereinafter "open data"), certain highly demanded data remains restricted due to legal constraints. In this study, we aim to analyze the factors that limit the opening and utilization of open data, focusing on cases wherein requests for open data provision have been denied. We will explore possible approaches that are in harmony with the Open Data Law while examining the constitutional value of open data, considering the foundational Open Data Charter that underpins the government's data policy. We will also examine cases wherein requests for data provision have been denied for institutional reasons, with nearly half of these cases involving open data that includes personal information. It is necessary to explore the potential for improvement in these cases. Furthermore, considering the recent amendment to the Personal Information Protection Act, which allows for the processing of pseudonymous information without the consent of the data subject for limited purposes, it is an opportune time to consider the need for amending the Open Data Law to facilitate broader access and utilization of open data for the nation. Lastly, we will propose institutional improvement directions aligned with the opening and utilization of open data by examining the constraints of and need for improvement in the selected target laws.