• Title/Summary/Keyword: data protection policy

Search Result 350, Processing Time 0.035 seconds

Data Protection and Privacy over the Internet: Towards Development of an International Standard (온라인 정보보호 및 프라이버시에 관한 국제 표준 개발)

  • Zoo, Hanah;Lee, Heejin;Kwak, Jooyoung;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.57-69
    • /
    • 2013
  • Progresses in ICT make the processing and exchange of personal data across international borders often necessary and relatively easy. The challenge lies in protecting fundamental rights and freedoms of individuals, notably the right to privacy and the right to personal information, while encouraging the free and secure flow of information across borders for the continued expansion of online transactions. The key to establishing a functioning international solution for personal data protection is to strike a right balance between the two camps which currently dominate the debate - the advocates of individual privacy rights on one side exemplified by the EU, and the proponents of self-regulation and economic efficiency on the other, represented by the U.S. In the face of a growing tension between the two sides each equipped with their own ideals, a practical solution may lie in utilizing established institutions of standardization such as ISO and IEC as a ground upon which an agreement can take its root.

Database Security System for Information Protection in Network Environment

  • Jung, Myung-Jin;Lee, Chung-Yung;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.211-215
    • /
    • 2003
  • Network security should be first considered in a distributed computing environment with frequent information interchange through internet. Clear classification is needed for information users should protect and for information open outside. Basically proper encrypted database system should be constructed for information security, and security policy should be planned for each site. This paper describes access control, user authentication, and User Security and Encryption technology for the construction of database security system from network users. We propose model of network encrypted database security system for combining these elements through the analysis of operational and technological elements. Systematic combination of operational and technological elements with proposed model can construct encrypted database security system secured from unauthorized users in distributed computing environment.

  • PDF

Mining Loot Box News : Analysis of Keyword Similarities Using Word2Vec (확률형 아이템 뉴스 마이닝 : Word2Vec 활용한 키워드 유사도 분석)

  • Kim, Taekyung;Son, Wonseok;Jeon, Seongmin
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.77-90
    • /
    • 2021
  • Online and mobile games represent digital entertainment. Not only the game grows fast, but also it has been noted for unique business models such as a subscription revenue model and free-to-play with partial payment. But, a recent revenue mechanism, called a loot-box system, has been criticized due to overspending, weak protection to teenagers, and more over gambling-like features. Policy makers and research communities have counted on expert opinions, review boards, and temporal survey studies to build countermeasures to minimize negative effects of online and mobile games. In this process, speed was not seriously considered. In this study, we attempt to use a big data source to find a way of observing a trend for policy makers and researchers. Specifically, we tried to apply the Word2Vec data mining algorithm to news repositories. From the findings, we acknowledged that the suggested design would be effective in lightening issues timely and precisely. This study contributes to digital entertainment service communities by providing a practical method to follow up trends; thus, helping practitioners have concrete grounds for balancing public concerns and business purposes.

A Case Study on the Introduction and Use of Artificial Intelligence in the Financial Sector (금융권 인공지능 도입 및 활용 사례 연구)

  • Byung-Jun Kim;Sou-Bin Yun;Mi-Ok Kim;Sam-Hyun Chun
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.21-27
    • /
    • 2023
  • This study studies the policies and use cases of the government and the financial sector for artificial intelligence, and the future policy tasks of the financial sector. want to derive According to Gartner, noteworthy technologies leading the financial industry in 2022 include 'generative AI', 'autonomous system', 'Privacy Enhanced Computation (PEC) was selected. The financial sector is developing new technologies such as artificial intelligence, big data, and blockchain. Developments are spurring innovation in the financial sector. Data loss due to the spread of telecommuting after the corona pandemic As interests in sharing and personal information protection increase, companies are expected to change in new digital technologies. Global financial companies also utilize new digital technology to develop products or manage and operate existing businesses. I n order to promote process innovation, I T expenses are being expanded. The financial sector utilizes new digital technology to prevent money laundering, improve work efficiency, and strengthen personal information protection. are applying In the era of Big Blur, where the boundaries between industries are disappearing, the competitive edge in the challenge of new entrants In order to preoccupy the market, financial institutions must actively utilize new technologies in their work.

Evaluation of Major Projects of the 5th Basic Forest Plan Utilizing Big Data Analysis (빅데이터 분석을 활용한 제5차 산림기본계획 주요 사업에 대한 평가)

  • Byun, Seung-Yeon;Koo, Ja-Choon;Seok, Hyun-Deok
    • Journal of Korean Society of Forest Science
    • /
    • v.106 no.3
    • /
    • pp.340-352
    • /
    • 2017
  • In This study, we examined the gap between supply and demand of forest policy by year through big data analysis for macroscopic evaluation of the 5th Basic Forest Plan. We collected unstructured data based on keywords related to the projects mentioned in the news, SNS and so on in the relevant year for the policy demand side; and based on the documents published by the Korea Forest Service for the policy supply side. based on the collected data, we specified the network structure through the social network analysis technique, and identified the gap between supply and demand of the Korea Forest Service's policies by comparing the network of the demand side and that of the supply side. The results of big data analysis indicated that the network of the supply side is less radial than that of the demand side, implying that various keywords other than forest could considerably influence on the network. Also we compared the trends of supply and demand for 33 keywords related to 27 major projects. The results showed that 7 keywords shows increasing demand but decreasing supply: sustainable, forest management, forest biota, forest protection, forest disease and pest, urban forest, and North Korea. Since the supply-demand gap is confirmed for the 7 keywords, it is necessary to strengthen the forest policy regarding the 7 keywords in the 6th Basic Plan.

A Study on the Trend Analysis Based on Personal Information Threats Using Text Mining (텍스트 마이닝을 활용한 개인정보 위협기반의 트렌드 분석 연구)

  • Kim, Young-Hee;Lee, Taek-Hyun;Kim, Jong-Myoung;Park, Won-Hyung;Koo, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • For that reason, trend research has been actively conducted to identify and analyze the key topics in large amounts of data and information. Also personal information protection field is increasing activities in order to identify prospects and trends in advance for preemptive response. However, only research based on technology such as trends in information security field and personal information protection solution is broadly taking place. In this study, threat-based trends in personal information protection field is analyzed through text mining method. This will be the key to deduct undiscovered issues and provide visibility of current and future trends. Policy formulation is possible for companies handling personal information and for that reason, it is expected to be used for searching direction of strategy establishment for effective response.

The Status of National Logistics Information System and The Future of Railway Logistics Information System (국가물류정보화 현황과 철도물류정보화 발전방향)

  • Kim, Dong-Hee;Ahn, Kyoung-Lim
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.3
    • /
    • pp.227-235
    • /
    • 2008
  • Recently, as change in global logistics environment, various issues have been presenting. These issues are including the pursuit of low cost-high added value, the realization of sustainable logistics system, the protection of environment, and the development of ubiquitous techniques. To cope with these environment changes and improve the national logistics system, the government have carried out various logistics policies and pushed ahead development of national logistics information network. But still, from a view-point of national logistics, there are several inefficient elements such as information connection and utilization, code/data standardization. In this paper, the survey result of global logistics environment change, logistics policy of a developed countries, domestic logistics policy and information system status will be presented. And from these status, suggestive points are mentioned. Finally the status of railway logistics information and future developments are presented.

A Study on Policy Strategies for Settlement of North Korean Defectors in Korean Society

  • Cho, Woo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.117-122
    • /
    • 2018
  • This study aims to search for policy strategies for settlement of North Korean defectors in Korean society, develop strategies based on the results and present their implications. For the purposes, this study set up a cause and effect model referring to previous bibliographical and statistical data. The results are presented as follows: First, to overcome anxiety of exposure in the defectors, personal information should be protected. Second, their psychological problems should be solved and they should be emotionally stable for better adaptation to Korean society. Third, keeping in mind that North Korean defectors are Korean people, the issue of nationality should be institutionally managed. Fourth, as one of difficulties they have is economic problems, practical support measures should be developed to solve them. Fifth, the federal government and local governments should be active in changing their recognition on them and provide the Korean community education for citizens to resolve cultural differences.

Learning-to-export Effect as a Response to Export Opportunities: Micro-evidence from Korean Manufacturing

  • HAHN, CHIN HEE;CHOI, YONG-SEOK
    • KDI Journal of Economic Policy
    • /
    • v.43 no.4
    • /
    • pp.1-21
    • /
    • 2021
  • This paper aims to investigate whether there is empirical evidence supporting the learning-to-export hypothesis, which has received little attention in the literature. By taking full advantage of plant-product level data from Korea during 1990-1998, we find some evidence for the learning-to-export effect, especially for the innovated product varieties with delayed exporters: their productivity, together with research and development and investment activity, was superior to their matched sample. On the other hand, this learning-to-export effect was not significantly pronounced for industries protected by import tariffs. Thus, our empirical findings suggest that it would be desirable to implement certain policy tools to promote the learning-to-export effect, whereas tariff protection is not justifiable for that purpose.

Welfare Dynamics in Korea Determinants of Welfare Exit (국민기초생활보장제도 수급동태의 특성 및 수급탈출의 결정요인 분석)

  • Lee, Won-Jin
    • Korean Journal of Social Welfare
    • /
    • v.62 no.3
    • /
    • pp.5-29
    • /
    • 2010
  • This study examines the welfare dynamics in Korea under the scheme of National Basic Livelihood Protection Program(NBLP). Data are drawn from Korean Welfare Panel study 2005~2007. Main findings are summarized as follows. First, the exit probabilities show a declining tendency with time on welfare increases. If the exit probabilities indeed decline over time, the earlier years on welfare deserve more interest in the policy perspective. Moreover, the vast majority of recipients are long-termers. Further efforts are needed to increase self-sufficiency through providing genuine opportunity and necessary support for recipients. Second, out-of-poverty exit and out-of-system exit are quite different in their properties. The results from the multivariate analysis confirm that the dropouts through out-of-system exit are virtually the same with those who remain on welfare. These results imply that the government should not resort to the negative policy proposals such as time limit and strengthening sanctions. Third, several explanatory variables have anticipated effect on welfare exit probabilities. Age, education, health, marital status, the presence of children, employment status have a certain level of impact on exit, with the only exception of gender. Since the identification of the determinants can facilitate sensible targeting on the potential leavers, these results have some implications on policy proposals.

  • PDF