• Title/Summary/Keyword: information protection responsibility

Search Result 80, Processing Time 0.021 seconds

The Main Methodological Positions of Educational Institutions in the System of Educational Work of the Modern Information Space

  • Shumiatska, Oleksandra;Palamar, Nataliia;Bilyk, Ruslana;Yakymenko, Svitlana;Yakovenko, Serhii;Tsybulko, Liudmyla;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.272-278
    • /
    • 2022
  • The article proves the idea that the protection and development of Ukraine as an independent, sovereign state requires the education of a patriot citizen who is able to live and work in a democracy, ensure the unity of Ukraine, feel constant responsibility for himself, his people, the country, and strive to make a real contribution to reform processes, especially in unstable, wartime. The main goal of educational institutions in the system of educational work of the modern information space is revealed. The tasks of patriotic education of the individual are presented. The content of patriotic education at the wartime stage and the main characteristics of the content of patriotism are substantiated. The main methodological positions that are taken into account in the construction of the structure and dynamics of the formation of civil responsibility of the individual are highlighted. The structure of civic responsibility as an integral system of the modern information space is drawn, which includes three subsystems that characterize the natural, social and systemic qualities of citizenship, interconnected hierarchically and synergistically. The components of the structural part of the model of civil culture of the individual in the modern information space are analyzed.Modern modernization of the education system in the modern information space, which has led to the emergence of a new type of Educational Institutions, requires the search for new pedagogical technologies that can ensure the formation of a patriotic citizen with an active civic position, which involves not only mastering students' knowledge about the rights and obligations of citizens, convincing them of the expediency of democratic transformations of society, the formation of high moral and strong-willed, patriotic qualities and feelings, but also identifying motivated civic actions, actions that are necessary during martial law in Ukraine.

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

A Case Study on Corporate Social Responsibility(CSR) of Domestic Cosmetics Companies (국내화장품기업의 사회공헌활동(CSR)에 대한 사례분석)

  • Yoon, Jin-Suk;Lee, Jae-Ha
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.219-228
    • /
    • 2018
  • The purpose of this study is to analyze the cases of social contribution activities of cosmetics companies and to suggest directions for related activities to be continued more effectively in the future. The case was analyzed through the report, public information, and interview with the person in charge. The main results derived from previous studies and case studies. First, social contribution activities of cosmetics companies are performed in a variety of ways such as education, business, medical care, health, environmental protection, culture, art, donation etc. Second, corporate social contribution activities and diversity were found to be highly correlated with firm size. Third, the effectiveness of social contribution activities can be enhanced through collaboration with social enterprises and professional organizations. Forth, strategic approach to social contribution activities, systematic public relations, and CEO's sense of responsibility have a major influence on related activities. Based on the results of this study, it has been suggested that CSR activities of cosmetics companies can be made more effective.

The Risk Management of Information System Using CRAMM - Case of a Korean Credit Card Company - (CRAMM을 이용한 정보시스템 위험관리 - 신용카드회사 사례연구 -)

  • Kim, Bob-Jin;Han, In-Goo;Lee, Sang-Jae
    • Asia pacific journal of information systems
    • /
    • v.10 no.2
    • /
    • pp.149-176
    • /
    • 2000
  • As companies become more dependent upon information systems(IS), the potential losses of IS resources become critical. IS management must assume the increasing responsibility for protection of IS resources as the IS and business environments become more vulnerable to various threats. The major issues facing management, when attempting to manage risks, include the assessment of the impact of risks on business objectives and the design of security safeguards to reduce the unacceptable risks to an acceptable level. This paper provides a case study of the risk management for IS. A Korean credit card company which has the high sensitivity for customers security was selected as a case. The risk management procedure using a powerful tool, CRAMM(the Central Computer and Telecommunications Agencys Risk Analysis and Management Method) was applied for this company.

  • PDF

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

The Mediating Effect and Moderating Effect of Pseudonymized Information Combination in the Relationship Between Regulation Factors of Personal Information and Big Data Utilization (개인정보 규제요인과 빅데이터 활용간의 관계에서 가명정보 결합의 매개효과 및 조절효과)

  • Kim, Sang-Gwang
    • Informatization Policy
    • /
    • v.27 no.3
    • /
    • pp.82-111
    • /
    • 2020
  • Recently, increasing use of big data have caused regulation factors of personal information and combination of pseudonymized information to emerge as key policy measures. Therefore, this study empirically analyzed the mediating effect and moderating effect of pseudonymized information combination as the third variable in the relationship between regulation factors of personal information and big data utilization. The analysis showed the following results: First, among personal information regulation factors, definition regulation, consent regulation, supervisory authority regulation, and punishment intensity regulation showed a positive(+) relationship with the big data utilization, while among pseudonymized information combination factors, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination were also found to be in a positive relationship with the use of big data. Second, among the factors of pseudonymized information combination, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination showed a positive(+) mediating effect in relation to regulation factors of personal information and big data utilization. Third, in the relationship between personal information regulation factors and big data utilization, the moderating effect hypothesis that each combination institution type of pseudonymized information (free-type, intermediary-type, and designated-type) would play a different role as a moderator was rejected. Based on the results of the empirical research, policy alternatives of 'Good Regulation' were proposed, which would maintain balance between protection of personal information and big data utilization.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

An Exploratory Study on the Difference between Recognition and Planning of Green Business/IT:Focus on Korean Manufacturing Industry (그린 비즈니스/IT도입시 인식에 따른 실행계획 차이에 대한 탐색적 연구:한국 제조기업을 중심으로)

  • Hwang, Young Hwan;Kim, Soung Hie;Jo, Hyeon
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.289-305
    • /
    • 2013
  • Recently, Green Business/IT becomes very important for management of company, because there are many new regulations about the environment protection, especially to reduce green house effect. The purpose of this research is to investigate present situation of Korean manufacturing industry about the Introduction of Green Business/IT. For the people who is in charge of the decision whether to Introduce Green Business/IT or not, this paper aim to provide some useful findings. We made a research framework consisting of 5Ps (Philosophy, Partner, Process, Product, Public) from literature review, then we found that almost all of the companies in manufacturing industry prepare for the regulations by introducing and using Green Business/IT concepts. There are some differences between production goods industry and consumer's goods industry. Also we found that there are a lot of relationships with recognition level and planning level. The higher the level of profitability, the lower the level of preparing social responsibility. This means there are two opposite perspectives(profitability, social responsibility). Therefore organizations who are adopting Green Business IT/should strive for harmony of sight.

An Exploratory Study on the Human Resource Management Strategy of Non-Standard Workers in the Korean Companies (한국기업에서 비정규직의 인적자원관리전략에 관한 탐색적 연구)

  • Park, Min-Saeng
    • Management & Information Systems Review
    • /
    • v.24
    • /
    • pp.73-75
    • /
    • 2008
  • The purpose of this study is to propose the human resource management strategies of non-standard workers that can contribute to accomplishing both corporate social responsibility and business purpose in efficient and effective ways. For the purpose, this researcher investigated circumstances under which Korean companies are using non-standard workers and systems related to those workers. In Korea, the Non-Standard Workers Protection Act was enacted and revised, and became effective on July 1, 2007. The main provisions of the act are as follows. First, the systems of discriminatory treatment prohibition was legally stipulated, Second, restrictions on overwork for fixed-term and part-time employees and the written statement of working conditions were compelled. Third, only 26 kinds of jobs were permitted for worker dispatch in accordance with positive list system. To achieve their business purpose, companies often use standard workers, but sometimes non-standard workers unavoidably in accordance with their business strategy. This study propose main human resource management strategies of non-standard workers such as determining the scope of jobs, strengthening legal and systematic human resource management, improving human relations, extending the grievance procedure and converting non-standard workers into standard ones.

  • PDF

Metabus culture and intellectual property. (메타버스 문화와 지적재산)

  • Seok, yeonseon;Kim, Soo dong;Kim, Deok min;Bae, Shin hoon;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.15 no.1
    • /
    • pp.27-36
    • /
    • 2022
  • Metabus, currently represented by Second Life on the Internet, is the next-generation 3DCG Internet world in which the 2D Internet world has evolved, and has grown as a new ICT culture of mankind that can replace real society with virtual society. As such, the reason why the world of metabus has rapidly expanded is that the era of 3D Internet has arrived due to the evolution of the Internet, which only used information, and the spread of 5G communication in user-participating WEB. However, there are many situations in which laws do not exist in this virtual world and various illegal acts occur. As the Internet culture developed earlier, illegal activities by users began to appear, and as the legal responsibility of Internet providers was discussed, mankind quickly passed the Millennium Copyright Act or introduced new copyright protection measures such as technical protection, transmission rights, and rights management information. Therefore, this paper reviews and studies how to accept and further grow this new metabus culture, including the viewpoint of intellectual property.