• 제목/요약/키워드: personal Information

검색결과 5,966건 처리시간 0.033초

Development of Vehicle Status Alerts System for Personal Information Leakage Protection using the NFC-based GCM Service (개인정보 유출 방지를 위한 NFC 기반 GCM 서비스를 이용한 차량 상황 알림 시스템 개발)

  • Kang, Hyun-Min;Choi, Hyun-Su;Cha, Kyung-Ae
    • Journal of Korea Multimedia Society
    • /
    • 제19권2호
    • /
    • pp.317-324
    • /
    • 2016
  • This paper proposes a message transfer application using smartphone with NFC(Near Field Communication) and GCM(Goolge Cloud Messaging) technology for prevention of personal information leakage. In implementing for the proposed system, we design a NFC-based vehicle status alerts service which make it possible to communicate with smartpone message without phone-number between a car driver and an unspecified person. The application provides message communication mechanism without exposing the real phone number, using the NFC tag written with the driver's smartphone device ID and GCM push messages. Through the evaluation result of the actual implemented application, the proposed system can be efficient technology in protection for leakage of personal information such as personal phone- number in daily life.

Design and Implementation of a Personal Health Record Platform Based on Patient-consent Blockchain Technology

  • Kim, Heongkyun;Lee, Sangmin;Kwon, Hyunwoo;Kim, Eunmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4400-4419
    • /
    • 2021
  • In the 4th Industrial Revolution, the healthcare industry is undergoing a paradigm shift from post-care and management systems based on diagnosis and treatment to disease prevention and management based on personal precision medicine. To optimize medical services for individual patients, an open ecosystem for the healthcare industry that allows the exchange and utilization of personal health records (PHRs) is required. However, under the current system of hospital-centered data management, it is difficult to implement the linking and sharing of PHRs in practice. To address this problem, in this study, we present the design and implementation of a patient-centered PHR platform using blockchain technology. This platform achieved transparency and reliability in information management by eliminating the risk of leakage and tampering/altering personal information, which could occur when using a PHR. In addition, the patient-consent system was applied to a PHR; thus, the patient acted as the user with ownership. The proposed blockchain-based PHR platform enables the integration of personal medical information with scattered distribution across multiple hospitals, and allows patients to freely use their health records in their daily lives and emergencies. The proposed platform is expected to serve as a stepping stone for patient-centered healthcare data management and utilization.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • 제13권5호
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

A Study on the Using Resident Registration Number and Alternatives for RRN (주민등록번호 사용현황과 대체수단에 관한 연구)

  • Choi, Haelahng;Chung, Chung-Yun;Choi, Sung-Eun;Pak, Hyejin;Kim, Chang-Soo;Ahn, Sung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2012년도 추계학술발표대회
    • /
    • pp.907-909
    • /
    • 2012
  • 주민등록번호는 주민생활의 편익 증진과 행정사무의 적정한 처리를 목적으로 도입되었으나 인터넷의 발달과 함께 관행적이고 무분별하게 사용되어 왔다. 수집된 주민등록번호가 해킹 등의 유출사고로 명의도용 등 범죄에 악용될 우려가 커지자 이를 근본적으로 해결하기 위하여 2011년 방송통신위원회는 인터넷상 주민등록번호 수집 이용을 제한하는 법 제도적 정책을 추진하였다. 정보통신망법이 개정되어 주민등록번호의 사용이 제한되면서 사업자에게 본인확인, 연령확인 등 법률의무의 이행이나 고객의 분쟁조정 등 목적을 위해 주민등록번호를 대체할 본인확인수단이 필요하게 되었다. 본 논문에서는 주민등록번호를 이용자가 입력하지 않으며 보편적으로 사용하고 있는 인프라를 이용하고 단순한 입력정보의 변경을 통해 본인확인을 할 수 있는 방안을 제안한다.

An Analysis of the Public Awareness on National Policy on Protection of Personal Information: using SERVQUAL (SERVQUAL 기법을 이용한 국가 개인정보보호 정책에 대한 국민 인식의 분석)

  • Lee, Kyung-bok;Yoon, Ki-chan;Shim, Mina;Lim, Jong-in;Park, Tae Hyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제26권4호
    • /
    • pp.1037-1055
    • /
    • 2016
  • After the enactment of the Personal Information Protection Act, policies and activities for the personal information protection have been actively promoted. However the people are showing negative attitudes about personal information, as the ongoing personal data leakages. Therefore, authors tried to empirical analysis of the effectiveness of national policy on the protection of personal information, using SERVQUAL model, focused on the people's perception, in order to identify that how the people recognized current policy. Authors find that the public has perceived the effectiveness of the policy positively, but the level of their awareness is low. And we identify that the people are highly aware of the policy's effectiveness for Immediacy, Convenience and Responsibility, while they have the lowest effectiveness for Efficiency. The policy's improvement focused on the public's low expectations/perceptions and effectiveness awareness, is required in order to develop people-oriented national privacy policy that are satisfied by the people.

A Study on Reinforcing Non-Identifying Personal Sensitive Information Management on IoT Environment (IoT 환경의 비식별 개인 민감정보관리 강화에 대한 연구)

  • Yang, Yoon-Min;Park, Soon-Tai;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • 제20권8호
    • /
    • pp.34-41
    • /
    • 2020
  • An era of stabilizing IoT markets and rapid expansion is coming. In an IoT environment, communication environments where objects take the lead in communication can occur depending on the situation, and communication with unspecified IoT environments has increased the need for thorough management of personal sensitive information. Although there are benefits that can be gained by changing environment due to IoT, there are problems where personal sensitive information is transmitted in the name of big data without even knowing it. For the safe management of personal sensitive information transmitted through sensors in IoT environment, the government plans to propose measures to enhance information protection in IoT environment as the use of non-identifiable personal information in IoT environment is expected to be activated in earnest through the amendment of the Data 3 Act and the initial collection method.

A Study on the Linkage and Gap in Personal Information Policy in Cloud Services between Multinational Companies' Human Resource Management and Domestic Companies' Human Resource Management (제조 전문 국제기업 인사관리와 국내 인사관리 클라우드 서비스 운영 개인정보정책과의 연계 및 괴리에 대한 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제19권1호
    • /
    • pp.639-643
    • /
    • 2018
  • Laws concerning the protection of personal information have been enacted and revised as the legislation on personal information protection on the basis of the Act on the Protection of Personal Information Maintained by Public Institutions. Nevertheless, there have been continuing threats resulting from the fact that restrictions on security subject to laws remain unclear. By proposing protected access utilizing a unique identification key of enterprises, regarding the personal information of various internal and external clients held by international manufacturing companies and attempting to make policy aspect and management access at the same time, there is a change of gradual decline in cloud personnel information management service, which is the domestic ISP service for personnel management as the technology facilitated to reduce the burden on personnel and cost for the protection of personal information and the market is also changing to the direction for companies to directly operate. Therefore, this study intends to examine the convenience of integrated management for ensuring security, while confirming the gap on flexibility and safety on management point regarding the human resources of international manufacturing companies arising from its interactions.

Analysis of Loss Expectancy on Personal Information leakage using Quantitative Invest Decision Model (투자결정 모델을 활용한 개인정보유출의 기대손실 분석)

  • Kim, Jeong Yeon
    • The Journal of Society for e-Business Studies
    • /
    • 제20권2호
    • /
    • pp.93-106
    • /
    • 2015
  • Providing trading partners with personal information to establish an e-commerce financial transaction is inevitable. Most e-commerce companies keep personal information and transaction data for user's convenience and develop additional services as their applications. However, keeping personal information increases the likelihood of identity theft causing direct or indirect damage while it may simplify repetitive financial transactions. This study introduces risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management. The empirical analysis with survey results from KISA (Korea Information Security Agency) shows that the root cause of different statistics of personal information leakage incidents according to core business of internet companies is the difference in their Loss Expectancy caused by them. Also we suggest disciplinary compensation and higher standard for personal information protection as a solution to prevent the variation of investment on it between individual companies.

Research on the Domestic and Foreign Legislation about Secondary Use Protection for Personal Health Information (개인건강정보의 2차이용 보호에 관한 국내외 법안 연구)

  • Park, Han-Na;Jung, Boo-Geum;Lee, Dong-Hoon;Chung, Kyo-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제20권6호
    • /
    • pp.251-260
    • /
    • 2010
  • Through the convergence of medical services and the IT technique, the patient's personal health information computerization has been rapidly spread with propagation of electronic medical record(EHR). In addition, by entering u-health, the demand of the secondary use for public health, medical research, and medical service using electronic patient health care records are increasing. The personal health information secondary uses for the development of academic medical area and service, are very good thing. But, carelessly to use personal health information, the patient privacy would be damaged. However, there are not yet systematic studies about secondary use of personal health information. Therefore, in this paper, we analyze the difference of the internal and external bill for personal medical data secondary use and propose the direction of the medical service development and preservation of the individual's privacy.

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제30권4호
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.