• Title/Summary/Keyword: financial protection

Search Result 321, Processing Time 0.029 seconds

A Study on Privacy Protection in Financial Mydata Policy through Comparison of the EU's PSD2 (유럽 PSD2 시행에 따른 금융분야 마이데이터 정책의 개인정보보호 강화 방안 연구)

  • Song, Mi-Jung;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1205-1219
    • /
    • 2019
  • As the ability to use data becomes competitive power in the data-driven economy, the effort to create economic value by using personal data is emphasized as much as to protect personal data. EU's PSD2(the second Payment Service directive) became the initiative of the Open Banking trends all over the world, as it is the Mydata policy which protects the data subject's right by empowering the subject to control over the personal data with the right to data portability and promotes personal data usages and transfer. Korean government is now fast adopting EU's PSD2 in financial sector, but there is growing concerns in personal data abuse and misuse, and data breach. This study analyzes domestic financial Mydata policy in comparison with EU's PSD2 and focus on Personal information life-cycle risks of financial Mydata policy. Some suggestions on how to promote personal information and privacy in domestic financial Mydata Policy will be given.

A Study on Decision Making for Blockchain-based IT Platform Selection for Security Token (블록체인 기반의 토큰 증권 IT 플랫폼 선택을 위한 의사결정 연구)

  • Soo-oh Yang;Byung Wan Suh
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.37-48
    • /
    • 2023
  • Since the announcement of the Financial Services Commission's 'Token Securities Issuance and Distribution System Improvement Plan' in February 2023, financial institutions, securities firms, and blockchain companies have been actively considering implementing IT platforms, but they are facing difficulties in selecting IT platforms for token securities because related legal regulations have not yet been clearly established. As a result, the need for rational and systematic criteria for the selection of blockchain-based token securities IT platforms has emerged, and this study explores and evaluates the key factors of token securities IT platform selection. Four factors were identified as the top-level factors, including 'maturity of the platform', 'operation and management of the platform', 'cost of introducing and maintaining the platform', and 'regulatory compliance for token securities', and 17 factors were identified as sub-level factors, including 'diversity', 'user authentication management', 'Adoption Costs', and 'financial regulations'. Among the 17 sub-factors, 'government financial regulation' and 'personal information protection' are selected as important factors, and the results of this study can help related organizations and financial companies make strategic decisions by providing systematic decision-making criteria for selecting token securities IT platforms.

  • PDF

Studies on Problems and Improvement of Introducing No Wetland Loss (습지총량제 도입에 따른 문제점과 개선방안에 대한 연구)

  • Kim, Yoon-Jung;Lee, Sang-Don
    • Journal of Environmental Impact Assessment
    • /
    • v.18 no.4
    • /
    • pp.235-243
    • /
    • 2009
  • Wetlands considered to be an important natural resources because they provide biodiversity and habitat for species to breed and survive. In this regard, many countries in the world provide wetlands and have policies and laws to protect them. In Korea we hosted RAMSAR COP-10 at Changwon in 2008 representing Korea's endeavor to wetland protection. But, in the process of development Wetlands are easy target to be lost due its easy access and the laws and regulations to protect them are relatively weak. Thus, this research focused on the introduction of No Wetland Loss(NWL) and we can achieve wetland protection in the economy market ways. Thus, NWL should consider 1) a clear definition of NWL and harmony and consensus of introduction of NWL, 2) considering most wetlands be private we need a financial support for securing wetlands, 3) inventories for wetlands in Korea, draw a line of demarcation, technic to evaluate wetlands, 4) wetland restoration considering function of ecosystem not total amount of wetlands. Wetland protection should be a part of Basic Law of Water Management which in its progress and we need further studies on wetland protection because of watershed management, deserted agricultural paddies, etc.

A study on International Payment Trend and Measures to Protect Credit Risk by International Factoring (국제대금결제 추세와 국제팩토링에 의한 신용위험 대처방안에 관한 연구)

  • Park, Se-Hun;Han, Ki-Moon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.44
    • /
    • pp.85-107
    • /
    • 2009
  • L/C allows the exporter to have a bank's payment undertaking against shipping documents required by L/C. This means that the exporter can take export proceeds from a L/C issuing bank regardless of importer's payments and therefore the L/C better mitigate importer's credit risk compared to remittance and collections. Recently the use of L/C has been on down trend in line with increasing use of T/T, causing a big change of payment system. This tells that the payment method change in Korea is positive as the change also happens same in developed countries. This however gives more buyer's credit risk to exporters and therefore a systematic solution to this negative effect is required. In Korea, export credit insurance has been widely used to cover the buyer's credit risk. But the export credit insurance is limited because of lack of government's financial support and strict evaluation of buyer and exporter. Now Korea is ranked 10the largest trading country and therefore the exporters shall find another source for credit risk protection elsewhere. And as such this paper suggest International Factoring as a tool for the credit risk protection. The International Factoring gives advantages to the exporter in terms of credit protection and advances by purchasing account receivables on a without recourse basis.

  • PDF

About the Designation of Privacy and Information Protection Firm (정보보호전문업체 지정에 즈음하여)

  • Shin, Hoon
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.4
    • /
    • pp.62-64
    • /
    • 2001
  • As of July 1. 2001, the Law of Information 8t Telecommunication Protection has been compulsory to audit protection status on national information and Telecommunications Infra facilities such as communication, electricity, waterworks, airport, railway, primary facilities of government and the first financial circles. In U.S. institutions, organizations and corporations in each field are trying to prepare for Safe Har-bor agreed on Internet privacy regulation between U.S. and Europe to be effective in 2003. The Safe Harbor was motl-vated by strict European standard. Other countries make privacy and information protection law according to their own interest. Therefore Korean technical experts have to develop the law responding to national interest and public welfare. Besides scientific Held, experts in the field of politic, economy and academy also have to work hard to develop the law.

  • PDF

Consideration on Royal Guards of Early Chosun Dynasty (조선전기(朝鮮前期) 호위제도(護衛制度)에 관(關)한 고찰(考察))

  • Song, Sang-wk;Kwon, Jeong-hoon
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.2
    • /
    • pp.67-85
    • /
    • 2010
  • The purpose of this consideration is to present fundamental data for understanding and development the historical approach of Korea Protection by re-examining Royal guarding system through the history in Early Chosun Dynasty. This paper initiated from this critical mind seeking to understand the changing phase of Korea Guarding system, and fundamentally to find the future-oriented ways for the Guarding system. The main materials of history in Early Chosun Dynasty were re-examined, investigated and analyzed and the main references are a code of laws and official as well as private documents such as Kukjo-Oreyeui. Guards system for Royal prince has been found in Byung-jeon of Kyungguk-daejon. he Guards organization has dual system, one was Gumgun which was a private military man and the other was Wuibyung which was a Central military man. On the contrary, central military man were normally protected the royale palaces, but when the King come and go they accompanied and protected the King in safety zone. But just in case they did a job as a member of capital protection military affairs. A question of finance was the reason why there had been dual protection system due to financial matter. If it increased number of man it would pay much money, therefore central military man who has no relevance to national finance were supplied as members of military affairs for the protection of king.

Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence : Focusing on the Mediating Effect of Information Security Awareness (금융회사의 정보보호활동이 정보보호의식 및 정보보호자신감에 미치는 영향 : 정보보호의식의 매개효과를 중심으로)

  • Soh, Hyeon-Chul;Kim, Jong Keun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.45-64
    • /
    • 2017
  • The Purpose of this Study is to find out the Implications of the Information Security Activities of Financial Companies on the Confidence of the Information Security Officers and to find Academic and Practical Implications to Supplement the Insufficiencies. As a Result, it was Confirmed that the Information Security Officer's Confidence in Information Security for Companies and the Level of Information Security Awareness of the Employees are Increased when Financial Companies Conduct Information Protection Activities Focusing on Information Security Education, Security Incident Responses and In/Out Security.

The Financial Burden of Catastrophic Health Expenditure Among Older Women Living Alone (여성독거노인가구의 과부담 의료비 지출에 관한 연구)

  • Shin, Serah
    • Journal of Family Resource Management and Policy Review
    • /
    • v.23 no.1
    • /
    • pp.17-34
    • /
    • 2019
  • Older women who live alone are among society's most vulnerable people, since they experience increased risk of multiple chronic diseases and have limited financial protection. This can lead older women living alone to catastrophic health expenditure(CHE), which is defined as a healthcare expenditure that exceeds a certain portion of a household's ability to pay. Using the Korean Longitudinal Study of Ageing(KLoSA), this study investigated the incidence of CHE among older women living alone and identified the factors related to this incidence. Applying health expenditure thresholds of 10%, 20%, 30% and 40% of ability to pay, the proportions of those with CHE were 41.3%, 22.9%, 14.6%, and 9.4%, respectively. Logistic regression models were used to identify factors related to CHE incidence, which include demographics, income, the number of chronic diseases, perceived health status, and health insurance type. The results show that the health care safety net in South Korea is insufficient for older women living alone. The findings can guide policymakers in improving healthcare and welfare policies to protect people from catastrophic payments. Particularly, welfare policies should be established for poor non-recipients who are not included within the benefits scope of the National Basic Livelihood Security System due to the unrealistic criteria of income recognition and family support obligation.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

An exploratory study of financial abuse among older adults (노인 경제적 학대에 대한 탐색적 연구)

  • Lee, Hyunjoo;Kim, Hyojung
    • 한국노년학
    • /
    • v.41 no.3
    • /
    • pp.327-351
    • /
    • 2021
  • This study was motivated by the awareness that little attention has been paid to this issue both theoretically and empirically, despite the fact that financial abuse causes serious problems which are difficult for the elderly to recover from. This study intends to explore what the patterns of financial abuse targeting the elderly are, what causes and sustains these abuses, and what makes it difficult to counter such financial abuses. Data analysis was based on individual and group interviews of ten professionals expected to encounter the most financially abused elderly in social welfare institutions. The thematic analysis shows that financial abuse is often caused and maintained in a trusting relationship through care and protection. Because financial abuse was inflicted on the vulnerable elderly in a state of reinforced psychological dependence based on a long and trusting relationship, it appears that it has been made with tacit acknowledgement and consent. Despite those complex dynamics, it is noted that financial abuse can be judged as such only when the elderly claim to suffer from harm. Rather, intervention without victims' acknowledgement tends to be perceived as violating their right to self-determination. This reality naturally leads to the termination of the necessary interventions with the victims in an abusive situation. Based on these results, discussion focused on more realistic and diverse approaches to the issue of financial abuse of older adults.