• Title/Summary/Keyword: personal information protection activity

Search Result 17, Processing Time 0.023 seconds

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers (개인정보보호 활동 결정요인 연구: 개인정보처리자를 중심으로)

  • Jang, Chul-Ho;Cha, Yun-Ho
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.64-76
    • /
    • 2021
  • The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.

College Students' Cognitive and Behavioral Attitude toward Digital Behavioral Advertising and Personal Information Protection through In-depth Interview (디지털 맞춤형 광고와 개인정보 보호에 대한 대학생들의 인식 및 행동연구)

  • Um, Namhyun
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.73-82
    • /
    • 2022
  • As digital advertising industry grows, consumers' concerns over personal information protect also rise. Thus, the current study is designed to explore college students' perspectives on digital behavioral advertising and personal information protection through in-depth interviews. According to study results, importance of personal information protection is highly regarded among college students and interviewees suggest individuals, companies, and government organizations work together to protect personal information. College students' behavioral level of personal information protection can be divided into three levels such as 1) no-action taken, 2) passive response, and 3) active response. The study found that college students' attitude toward digital behavioral advertising is positive and also negative at the same time. Lastly, the study suggests that college students have positive attitude toward companies' personal information collection and use for the marketing purpose such as digital behavioral advertising. At the discussion section this study puts emphasis on the need for digital media literacy education and suggests practical implications for personal information collection and its procedures.

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

Research a Study on Awareness and Practice of Personal Information Protection in Students (대학생들의 개인정보 보호인식과 실천에 대한 인지도 조사연구)

  • Lee, Hye-Seung;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.53-67
    • /
    • 2019
  • This study is expected to be of significance in that it attempted to examine the personal information protection awareness of college students and the state of their personal information protection as prospective information processors and private information owners to boost their will to put private information protection in practice. As a result of making an analysis, the most common average time that the students spent in doing every online activity on weekdays was fewer than two or three hours, and the most dominant activities that they did over the Internet were for entertainment or hobbies. As for awareness of the nature of the Internet, they looked upon it as a quite open public space. Regarding the state of private information protection, they thought that changing passwords on a regular basis would be beneficial to personal information protection, and many thought that it's needed to withdraw from or shut down web sites that weren't used for a long time. In terms of actual practice, however, they didn't change their e-mail passwords regularly on the grounds that it's a hassle, and even the students who had experience of personal information leakage didn't report it or didn't ask for counsel on the grounds that they didn't want to be bothered as well. The majority of the students weren't cognizant of how to report or seek counsel. In the future, personal information protection should be educated on a continual basis as part of curriculum to raise awareness of it among students and boost their will to practice it with a sense of responsibility in an effort to prevent the occurrence of collateral damages triggered by personal information leakage.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Task-specific Noise Exposure Assessment of Firefighters

  • Kang, Taesun
    • Journal of Environmental Health Sciences
    • /
    • v.45 no.6
    • /
    • pp.569-576
    • /
    • 2019
  • Objectives: The main purpose of this study was to assess firefighters' daily personal noise exposure and explore noise levels related to specific tasks and their contributions to total noise exposure using 24-hour full-shift noise exposure measurements with task-based data. Methods: Noise exposure was assessed for eight firefighters (two rescuers, two drivers, and four suppressors) using time-activity diaries. We collected a total of 24 full-shift personal noise sample sets (three samples per a firefighter). The 24-hour shift-adjusted daily personal noise exposure level (Lep,d), eight weekly personal noise exposures (Leq,w), and 40 task-specific Leq values (Leq activity) were calculated via the ISO/NIOSH method. Results: The firefighter noise-sample datasets showed that most firefighters are exposed to noise levels above EU recommended levels at a low-action value. The highest noise exposure was for rescuers, followed by drivers and suppressors. Noise measurements with time-at-task information revealed that 82.3% of noise exposure occurred when checking equipment and responding to fire or emergency calls. Conclusions: The results indicate that firefighters are at risk of noise-induced hearing loss. Therefore, efforts at noise-control are necessary for their protection. This task-specific noise exposure assessment also shows that protective measures should be focused on certain tasks, such as checking and testing equipment.

The consideration about prevention ways of discovery of emergency situation which is based on guard techniques (경호기법에 의한 위급상황의 발견과 대처 방안에 관한 고찰)

  • Gong, Bae-wan
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.2
    • /
    • pp.11-20
    • /
    • 2010
  • All of the people or objects which are contacted during the activity of guard are added to range of objects. guard has to notice decision, question proposal, observation, accomplish to be happened them at the same time recognizing the steps as soon as possible. Before a lot of information of client are shown, guard expert has to search observation of materialization, extension of reservation, notification of business and causes of danger through personal interviews. Rapid communication system has to be assumed and effective caution, protection and shelter and following prevention are cooperated as well as has to care about safe of guard object by a protective wall. And also has to get out of the ground, keep the large shape when moves, prevent the trials of attack from the assassinators after takeing control over weapons.

Protective Way Improvement of a Crime Victim's Rights of Portrait (범죄 피해자의 초상권보호 개선방안)

  • Joen, Chan-Hui
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.286-298
    • /
    • 2009
  • Became large a problem we were productive movement of information became large and occurring to diffusions of development of public media and Internet use. While the Internet became a generalization, public media had more influences and risks, and a crime to abuse anonymity became large in cyber space. In addition, damage is becoming expanded reproduction that infringe of ' crime victim's rights of portrait'. The point that is most important in order to improve these points is recognition regarding the special situation of crime victim, and the ethic consciousness and independent operation regulation and regulation system that these point was taken into consideration in the public media and Internet operation that are an information producer is necessary, and Internet portal shall be included like Internet newspapers to the arbitration object of the Press Arbitration Commission. Also, a legal system regarding personal responsibility shall have for protection of a crime victim's rights of portrait by personal information activity for protection in cyber space. Suggest to a portrait of a crime victim, and an individual and social rights security effort are required for activation regarding an infringement relief system.

Propensity Analysis of Terrorism and Political Leaders Countermeasures (정치지도자 요인테러 성향 분석과 대응방안)

  • Kang, Kyoung Soo;Song, Sang Wook
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.3
    • /
    • pp.287-296
    • /
    • 2012
  • This study is analysis of the existing domestic terrorism factors and suggest countermeasures for political leadership that can occur to the precautionary terror occasion of the presidential election approached 100 days in the future. Political terror caused mainly achieved peak of Ideology or social conflict by Politically alienated class. Common cause is most likely to occur when the party or the government want to attack a target or can not stand disadvantaged and lose that I suppert the party or the government. 21st century political terror is occurred with Misfits of complaints expressed or social conflict more frequency than attack used random people, new weqpon and bomb. It is interpreted that issued as a drastic measure from individual complaint because of increased polarization of wealth by separate into group and fallen law and order but also we are not familiar with the political compromises. Personal safety escort mission is essential condition of political activity that Absolute personal protection and to come up with a large number of voters for best result. Thus security guard ought to professional security activity depend on gathered situation, location and regional feature for perfect protection service.

A Study on Legal Issues of Data Portability and the Direction of Legislative Policy (개인정보 이동권의 법적 이슈와 입법 정책 방향)

  • Yi, Chang-Beom
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.54-75
    • /
    • 2021
  • The right to data portability needs to be introduced to strengthen the self-control of data subjects and promote personal data use. However, the right to data portability constitutes a high risk of invasion of privacy of data subjects and may infringe on the property rights of data controllers, so careful and thorough design is warranted. The right to data portability can intensify the concentration and monopoly of personal data, result in problems of overseas transfer of personal data held by public institutions, and enrich only the profits of giant platforms by burdening the data subject with high transfer cost. By contrast, SMEs are more likely to endure a personal data deprivation. From the proposed amendment to the Personal Data Protection Act are raised various legal issues such as. i) Whether to include inferred/derived data, personal data held by public institutions, activity data, sensitive data, and personal data of third parties within the scope of data portability; ii) whether SMEs are included in the data porting organization; iii) whether to exclude SMEs or large platforms from the scope of the data receiving organization; iv) Whether to allow the right to transmit to other data controllers, v) Whether to allow the overseas transfer of personal data held by public institutions, vi) How to safely exercise the right to data portability, vii) the scope of responsibility and immunity of a data porting organization, etc. The purpose of this paper is to propose the direction for legislative action based on various legal issues related to data portability.