• Title/Summary/Keyword: personal

Search Result 14,823, Processing Time 0.036 seconds

Legal examination of personal information disclosure system of administrative (행정상 인적사항공개제도에 대한 법률적 검토)

  • Ryu, Gi Hwan;Shin, Mi Ae
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.89-97
    • /
    • 2016
  • Disclosure of personal information to be carried out in one of the Administrative Publicity, Administrative agency as specific information about the person who has violated the obligation imposed by the law is an unspecified number people know is through the direct or Internet media it is to be disclosed in an unspecified number of people. This is, indirect sanctions so as to fulfill its obligations by the addition of psychological pressure that exposes the personal information of the fact that in breach of his obligations to the breach of duty and it has been an unspecified number of people know it is a means. However, publication of these personal information, infringement of the moral rights of the Constitution guarantees an individual, of course, not only a matter of law that the right to self-determination of the personal information, has continued also doubts for the effectiveness of the system. As a result, in this paper, to discuss legal issues with the disclosure of management personal information and its improvement measures, and expected to be able to take advantage of the efficient development of the future of personal information disclosure system.

Scenario Analysis of Personal Nitrogen Dioxide Exposure with Monte Carlo Simulation on Subway Station Workers in Seoul (확률론적 모의실험 기법을 이용한 일부 지하철 근무자들의 이산화질소 개인노출 시나리오 분석)

  • 손부순;장봉기;양원호
    • Journal of Environmental Science International
    • /
    • v.10 no.3
    • /
    • pp.195-200
    • /
    • 2001
  • The personal exposures of nitrogen dioxide(NO$_2$), microenvironmental levels and daily time activity patterns on Seoul subway station workers were measured from February 10 to March 12, 1999. Personal NO$_2$exposure for 24 hours were 29.40$\pm$9.75 ppb. NO$_2$level of occupational environment were 27.87$\pm$7.15 ppb in office, 33.60$\pm$8.64 ppb in platform and 50.13$\pm$13.04 ppb in outdoor. Personal exposure time of subway station workers was constituted as survey results with $7.94\pm$3.00 hours in office, $2.82\pm$1.63 hours in platform and 1 hours in outdoor. With above results, personal $NO_2$exposure distributions on subway station workers in Seoul were estimated with Monte Carlo simulation which uses statistical probabilistic theory on various exposure scenario testing. Some of distributions which did not have any formal patterns were assumed as custom distribution type. Estimated personal occupational $NO_2$exposure using time weighted average (TWA) model was 31.$29\pm$5.57 ppb, which were under Annual Ambient Standard (50ppb) of Korea. Though arithmetic means of measured personal $NO_2$exposure was lower than that of occupational $NO_2$exposure estimated by TWA model, considering probability distribution type simulated, probability distribution of measured personal $NO_2$exposures for 24 hours was over ambient standard with 3.23%, which was higher than those of occupational exposure(0.02%). Further research is needed for reducing these 24 hour $NO_2$personal excess exposures besides occupational exposure on subway station workers in Seoul.

  • PDF

Measuring method of personal information leaking risk factor to prevent leak of personal information in SNS (SNS에서 개인정보유출방지를 위한 개인정보 유출위험도 측정 방법)

  • Cheon, Myung-Ho;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1199-1206
    • /
    • 2013
  • SNS is relationship based service and its users are increasing rapidly because it can be used in variety forms as penetration rate of Smartphone increased. Accordingly personal information can be exposed easily and spread rapidly in SNS so self-control on information management, right to control open and distribution of own personal information is necessary. This research suggest way of measuring personal information leaking risk factor through personal information leaking possible territory's, based on property value and relationship of personal information in SNS, personal information exposure frequency and access rate. Suggested method expects to used in strengthening self-control on information management right by arousing attention of personal information exposure to SNS users.

A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services (온라인 서비스의 본인확인 요구사항 분석 기반의 차등화된 본인확인서비스 적용 방안)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.201-208
    • /
    • 2020
  • Recently, the application of personal proofing service based on social security number(SSN) replacement means for verifying identity in non-face-to-face transactions is increasing. In this paper, we propose a method of applying differentiated personal proofing service on whether identity verification is necessary in the online service provided by ISP and if it is appropriate to apply a certain level of assurance. By analyzing the requirements related to personal proofing required by current ISPs, we analyze the risks for each of the requirements and propose a method of applying differentiated personal proofing service according to the level of identity assurance guarantee to minimize the risks. In applying the proposed method to online service provision, it is possible to reduce user's unnecessary authentication cost by minimizing the application of personal proofing service based on alternative means, and to help protect user personal information by minimizing excessively collected personal information.

Design and Implementation of Personal Information Identification and Masking System Based on Image Recognition (이미지 인식 기반 향상된 개인정보 식별 및 마스킹 시스템 설계 및 구현)

  • Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Recently, with the development of ICT technology such as cloud and mobile, image utilization through social networks is increasing rapidly. These images contain personal information, and personal information leakage accidents may occur. As a result, studies are underway to recognize and mask personal information in images. However, optical character recognition, which recognizes personal information in images, varies greatly depending on brightness, contrast, and distortion, and Korean recognition is insufficient. Therefore, in this paper, we design and implement a personal information identification and masking system based on image recognition through deep learning application using CNN algorithm based on optical character recognition method. Also, the proposed system and optical character recognition compares and evaluates the recognition rate of personal information on the same image and measures the face recognition rate of the proposed system. Test results show that the recognition rate of personal information in the proposed system is 32.7% higher than that of optical character recognition and the face recognition rate is 86.6%.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

The Study about Personal Color System with Hair color and Make-up - Centering around the Autumn type - (개인(個人) 색채(色彩) 진단(診斷)에 따른 모발(毛髮)과 메이크업 색상(色相)의 변화(變化) - 가을 타입의 모델을 중심(中心)으로 -)

  • Na, Hae-Yun;Cho, Koh-Mi;Lee, Su-Hee
    • Journal of Fashion Business
    • /
    • v.9 no.2
    • /
    • pp.20-27
    • /
    • 2005
  • To find suitable color for an individual is very important in personal image-making. In recent years, the importance and role of personal image is also more emphasized. This study deals with the necessity d personal color system and the proposal of color which looks nice on a person as a result d personal color system. It also includes the method of making personal image by balancing between and using both favorite color and unfavorite color. Besides, I study how does the color image affect the personal appearance image in this paper. From clinical experiments, I concluded as follow. First, Each person has his suitable color. When the color is used, the color, pimples, flows and so on are covered and defects of his face are made up for. Second, By changing the factors of his own original color-group and decision factors - color d skin, hair, eye, etc -, I can change personal color-group. Third, The image of color affects the personal appearance image, when it used in make-up and hair-color. Considering above results, If one uses one's suitable color, one will complement defects done's face and improve merits of one's. Besides, One will be more confident and active by using one's suitable color.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

A Study on the Utilization of Projection Mapping in Personal Media (Personal Media에서 Projection Mapping 활용성 연구)

  • SHI, YU;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.377-383
    • /
    • 2020
  • This paper studies the current development of personal media and the development of project mapping technology. The speed of social life is speeding up, and information dissemination tends to be fragmented. With the rapid development of mobile technology in recent years, personal media has gradually attracted the attention of people. And now image production and video editing become more and more simple in mobile devices, which provide a basis for the active personal media. The emergence of video content with high creative which is producing by projection mapping. And also providing an attractive new content for the general public. With the popularity of home projector, and the development of mobile terminal projection mapping production application. In the future, it will be possible to use projection mapping to produce personal media contents on the basis of mobile media platform.

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.