• Title/Summary/Keyword: personal

Search Result 14,884, Processing Time 0.035 seconds

A study on the Development Plan of Personal Information Protection System (개인정보보호 체계 발전 방안에 대한 연구)

  • Sang-Hyun Joo;Byoung-Hoon Choi;Jin-Yong Lee;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.167-176
    • /
    • 2024
  • The Personal Information Protection Commission was launched in August 2020 as an integrated control tower for personal information protection, but several problems have been pointed out in the personal information protection operation system. First, despite the fact that Korea's personal information protection system has an integrated legal system that regulates both the public and private sectors, it has been pointed out that it is difficult to carry out smooth personal information protection functions due to incomplete integration of protection functions, such as the Financial Services Commission being in charge of personal credit information protection and the Korea Communications Commission being in charge of personal location information protection. Next, despite the increasing number of public sector personal information leakage incidents, there is a lack of personnel with expertise and specialized support organizations to efficiently investigate them, and there is a concern that the lack of an efficient response system to personal information infringement by global IT companies in Korea in the era of digital commerce may weaken the protection of citizens' personal information. In order to solve these problems, I reviewed overseas cases and literature and proposed the following measures. First, it is necessary to centralize the personal information protection supervision function for credit information and location information to the Personal Information Protection Commission. Second, it is necessary to secure expertise by securing specialized personnel and establishing specialized institutions to respond to public sector personal information leakage incidents. Third, it is necessary to revitalize the domestic agency designation system and establish an international cooperation system to protect people's personal information in the digital commerce era. I believe that these measures to develop the personal information protection system will lead to more systematic personal information protection.

Impact of Corporate Characteristics on Personal Information Breach Accident (기업의 특성이 개인정보 유출 사고에 미치는 영향)

  • Kim, Taek-Young;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.13-30
    • /
    • 2020
  • Not only does it cause damage to individuals and businesses due to the occurrence of large-scale personal information leakage accidents, but it also causes many problems socially. Companies are embodying efforts to deal with the threat of personal information leakage. However, it is difficult to obtain detailed information related to personal information leakage accidents, so there are limitations to research activities related to leakage accidents. This study collects information on personal information leakage incidents reported through the media for 15 years from 2005 to 2019, and analyzes how the personal information leakage incidents occurring to companies are related to the characteristics of the company. Through the research results, it is possible to grasp the general characteristics of personal information leakage accidents, and it may be helpful in decision making for prevention and response to personal information leakage accidents.

Study on the Personal Air-Conditioning System Considering Human Thermal Adaptation (인간의 열적 적응성을 고려한 퍼스널 공조시스템의 개발)

  • 송두삼
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.15 no.6
    • /
    • pp.524-532
    • /
    • 2003
  • In this paper, a personal air-conditioning system considering the human thermal adaptability is analyzed. Although the conventional personal air-conditioner was proofed to be satisfactory in providing for the thermal comfort, it is being questioned on the term of its energy efficiency. Therefore, it is important and urgent to develop new types of personal air-conditioning system with sustainable control strategy that can ensure energy saving and thermal comfort simultaneously. In this study, we first examined the problems of the conventional personal air-conditioning system with field interview and laboratory experiment in terms of usage, management and thermal comfort, and proposed the energy-saving personal air-conditioning system considering the human thermal adaptation. Then a laboratory experiment was performed to analyze the characteristics of the human thermal comfort under severe indoor thermal conditions, which were controlled using a new personal air-conditioning unit designed according to the proposal. The results help to illustrate the alleviation effect of the new personal air-conditioning system, and indicate that the thermal alleviation time is useful to maintain the thermal comfort with efficient usage of energy.

A Model of Authority Management for the Protection of Personal Information in OLAP (OLAP 환경에서 개인정보보호를 위한 개인정보 분리 권한관리 모델)

  • Kim, Hyoung-Gyu;Kim, Min-Ho;Kwon, Jung-Sook;Choi, Yong-Lak
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.163-172
    • /
    • 2014
  • Personal information has been stolen continuously and it is also affected from development of the Internet. So the government requires that companies spend more effort for protecting customers' personal information. The OLAP server also should meet this requirement, but it is hard to satisfy for the authority management. The OLAP server must use personal information to extract required information from database. This thesis suggests a model of separating between general information and personal information, so this model can help to minimize the leakage of personal information. The model is implemented and tested as a prototype. This prototype can prove that the new model is better than the original one. This study presents that the authority management on the separation between personal information and general information helps protect the personal information of customers.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

A Study on Notification Method of Personal Information Usage History using MyData Model (마이데이터 모델을 활용한 개인정보 이용내역 통지 방안 연구)

  • Kim, Taekyung;Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.1
    • /
    • pp.37-45
    • /
    • 2022
  • With the development of the 4th industry, big data using AI is being used in many areas of our lives, and the importance of data is increasing accordingly. In particular, as various services using personal information appear and hacking attacks that exploit them appear in various ways, the importance of personal information management is increasing. Personal information must be managed safely even when collecting, retaining, using, providing, and destroying personal information, and the rights of information subjects must be protected. In this paper, an analysis was performed on the notification of usage history during the protection of the rights of information subjects using the MyData model. According to the Personal Information Protection Act, users must be periodically notified of the use of personal information, so we notify each individual of the use of personal information through e-mail or SNS once a year. It is difficult to understand and manage which company use my personal information. Therefore, in this paper, a personal information usage history notification system model was proposed, and as a result of performance analysis, it is possible to provide the controllability, availability, integrity, source authentication, and personal information self-determination rights.

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

Research on a Model that reflects requests to suspend processing personal data in real time (개인정보 처리정지 요청을 실시간 반영하는 모델 연구)

  • Younhee Hong;Sang-Soo Ye
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.141-150
    • /
    • 2024
  • The importance of personal data protection is increasingly emphasized both at home and abroad, and while overseas countries are applying various policies and dynamic management technologies, there are some gaps between compliance with laws and regulations and the application of technologies in Korea, and there are few user interfaces that provide convenient ways for data subjects to stop processing personal data. This study first analyzes the need for dynamic personal information consent management technology, the current state of the industry, and the prospects for its development. Next, this study proposes a basic model for dynamic management of personal information consent that maximizes the data subject's right to personal data self-determination while strictly complying with personal data protection laws in Republic of Korea. In particular, this study analyzes the basis of domestic laws and regulations related to the suspension of personal data processing, designs a basic model of personal data consent dynamic management interface, and presents its effectiveness. Based on the results of this study, we expect that the proposed dynamic management model for personal data use consent can be used in various ways for various websites and applications in the future.

  • PDF

An Empirical Study on the Relationship between Role Stress and Personal Creativity: The Mediating Roles of Creative Self-Efficacy and Personal Initiative (역할스트레스와 개인 창의성 간의 관계에 대한 실증연구: 창의적 자아효능감과 자기주도성의 매개역할)

  • Heo, Myung Sook;Cheon, Myun Joong
    • The Journal of Information Systems
    • /
    • v.22 no.2
    • /
    • pp.51-83
    • /
    • 2013
  • Personal creativity is critically important for organizations seeking to survive and thrive in today's highly turbulent business environments. Organizations must effectively identify and mobilize the creative resources of their members. When organizational members perceive a work environment that restricts or fails to encourage individual creative expression, a gap may exist between the level of individual creative potential and the actual amount of individual creativity practiced within the organization. In this situation, this paper will examine the impact of role conflict, role ambiguity, creative self-efficacy, and personal initiative on personal creativity. Creative self-efficacy is the subjective belief in one's personal ability to be creative, that is, a personal assessment of one's own creative potential. A strong internal belief in one's ability to successfully engage in creative behaviors is generally considered an important part of the creative process. Personal Initiative refers to behaviors, mainly directed toward work and organizational issues, that are characterized by the following aspects: self-starting, proactive, and persistent in overcoming barriers. Creativity-related creative self-efficacy and personal initiative are critical components to understand motivation that coordinates the relationship between perception and behavior of individual employees. Based on role theory, researchers have focused on role conflict and role ambiguity as the two key ingredients of role stress. Role ambiguity is defined as an evaluation about the lack of salient information needed to perform a role effectively. Role conflict results from two or more sets of incompatible demands involving work-related issues. Employees are usually pursued work-roles more than one in work-focused organization. Too many work-roles and perceived uncertainties at employee's work can be obstacles to personal creativity. In an analysis of results, while role conflict is not negatively related significantly to creative self-efficacy, role ambiguity is negatively related significantly to creative self-efficacy. While role conflict is significantly related to personal creativity, role ambiguity is negatively related significantly to personal creativity. Creative self-efficacy mediates the relationship among role conflict, role ambiguity, and employee creativity. Personal initiative mediates the relationship between creative self-efficacy and employee creativity. This paper shows that creative self-efficacy and personal initiative are the driving force behind personal creativity. Organizations can get some implications of creative-related role conflict and role ambiguity that employees have experienced. As a result, organizations must not only encourage creativity of employees by greater involvement but also encourage their input towards their-focused own works and tasks. And employees should be developed to pace with the organizational needs and development. Management must enable employees to think of new ideas and practices that promotes personal creativity.

The Roles of Self-Expression and Identification on the Personal Community Commitment (개인 커뮤니티 몰입에 대한 자아표현 및 동일시의 역할)

  • Choi, Nak Hwan;Lee, Chang Won
    • Asia Marketing Journal
    • /
    • v.9 no.3
    • /
    • pp.117-149
    • /
    • 2007
  • It can be explained by congruity theory as a process that consumers engage in a matching process to identify personal community that is congruent with their self-images to find the identification between the self and the personal community. Personal community cues that evoke certain images are viewed as activating similar beliefs about the self (e.g., high status). Individuals prompt a comparison process to determine whether the personal community and self-image are congruent and imagine prototypical users of the personal community and select ones that maximize similarity to their actual or desired self-concept. Identity is devided into personal identity and social identity. Consumers are likely to be influenced by both personal identity and social identity. In this article the influencing factors of the commitment to on-line personal community are explored by the sources of both personal identification and social identification. The results are as follows. The maintenance expression and enhancement expression of personal self influence the level of personal identification positively and the maintenance expression and enhancement expression of social self influence the level of social identification positively. The level of both social and personal identification positively influence the commitment to on-line personal community which gives positive responses to the source enterprise that allows the cyberspace and the other benefits to be used.

  • PDF