• Title/Summary/Keyword: private information

Search Result 2,830, Processing Time 0.027 seconds

Methods of Organization of Information And Communication Technologies In Institutions of Higher Education

  • Popova, Alla;Sinenko, Oksana;Prokopenko, liudmyla;Dorofieieva Veronika;Broiako, Nadiia;Danylenko, Olha;Vitkalov, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.140-144
    • /
    • 2021
  • The article considers aspects of improving the quality of training of specialists based on the use of modern information and communication technologies in the educational process; the use of teaching methods and, as a result, an increase in the creative and intellectual components of educational activities; integration of various types of educational activities (educational, research, etc.); adaptation of information technology training to individual the characteristics of the student; ensuring continuity and consistency in learning; development of information technologies for distance learning; improving the software and methodological support of educational process.

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

The Private Sector, Private Authority and Global Media Governance (민간부문, 사적권위, 그리고 글로벌 미디어 거버넌스)

  • Moon, Sang-Hyun
    • Korean journal of communication and information
    • /
    • v.29
    • /
    • pp.73-110
    • /
    • 2005
  • This study examines the increasing influence of the private sorter in global media governance, which represents decentralization of international politics resulted from the rapid globalization in the areas of politics, economy and culture. Introducing a concept of the private authority which theoretically explains increasing power of the private sector, including transnational corporations and business associations in global governance, this study discusses how the private sector and its governance activities ran be recognized as legitimate as those of the state. Based on this theoretical discussion, the study examines what the Increasing role and power of the private sector In global media governance imply with regard to democratic accountability.

  • PDF

A Proposal of Methods for Building Databases about the Accumulation of Disuse Utilizing the Political System to Discard Private Information According to the Expiration of In-service Life and Observation of Legal Standards (보존연한 도래 및 법적기준 준수를 위한 개인정보 정책적 폐기시스템을 활용한 폐기 누적현황 데이터베이스 구축에 관한 방안 제안)

  • Seo, Wooseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.45-53
    • /
    • 2018
  • The Personal Information Protection Act has been revised continuously since its establishment, and as a way to secure stability properly, the guidelines as well as enforcement ordinances and regulations have been changed, too. It seems that people's recognition and awareness of private information have already evolved to a certain level that is regarded to be fairly high. However, no one can exactly imagine how much ripple effect scrapping discarded paper regarded simply as waste material which is often and easily practiced in our everyday lives exerts and how many socially significant events it may arouse in our lives. Private information is produced, operated, preserved, utilized, distributed within the frame of law unidentified, and then discarded with a particular purpose. While going through a series of processes, each piece of that private information comes to be reproduced melting a lot of information. It is used and also changed beneficially sometimes to richen our lives or as basic material for welfare. Meanwhile, its importance is decided by its weight or mass and then often gets discarded after all. It means that the process of disuse is being done in a way to arouse the possibility of invasion of personal rights and also the second and third and also more exposure of private information. Therefore, approaching the meaning of automation politically, this study aims to suggest how to secure stability in the process of discarding private information in terms of logical automation.

A Study on Sharing Descriptive Information for Establishing Private and Community Archive Network (민간뀇공동체 아카이브 네트워크 구축을 위한 기술정보 공유 방향 연구)

  • Hyun, Moonsoo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.127-150
    • /
    • 2013
  • Growing interest in everyday-life archives and community archives leads to the establishment of small-scale archives in the private sector. Interoperability of descriptive information is necessary to be able to have a link between these factors. The purpose of this study is to explore how descriptive information can be interoperable in private archives, which participate in the archives network, and to suggest a direction in organizing the private and community archives network. For this purpose, it investigated the current situation of archival description in small-scale private archives in Korea, especially in terms of collection, and analyzed descriptive information applied to four foreign archives networks. Based on the analysis, it gives some suggestions for sharing descriptive information in Private and Community Archive Network (PCAN) in Korea.

A Study on the Role of Private-led Information Provision: Case of COVID-19 Pandemic (코로나19 팬데믹 상황에서 살펴본 민간 주도 정보제공의 역할 분석)

  • Cho, Hosoo;Jang, Moonkyoung;Ryu, Min Ho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.1-13
    • /
    • 2021
  • With the global pandemic of COVID-19, it is pointed out that exposure to false information to the public could cause serious problems. However, in pandemic situations, there is also an positive effect for the public to share private-led information rather than centralized unilateral delivery of information. This study analyzes the role of private-led information provision in infectious disease situations. To this end, topic modeling and sentiment analysis is carried out on online reviews of all COVID-19-related applications in Google Playstore provided by the Korean government and the private. The results showed that the user's evaluation of private apps, which were used from the early stage of COVID-19, was much higher than the apps provided by the government. In particular, users responded more positively to private apps than government apps in all aspects such as reliability of information, risk avoidance, timeliness, usefulness, and stability. Based on these results, a post-monitoring system is recommended rather than a pre-block of all private apps.

Design of a Private Key Escrow System based on the Fingerprint Identification (지문 인식 기반의 개인키 위탁 시스템의 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

Countermeasures of Privacy Disclosure Vulnerability in Data Transfer Section (데이터 전송 구간에서 개인정보노출 취약점과 대응방안)

  • Heo, Geon Il;Kang, Ji Won;Park, Won Hyung
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.163-171
    • /
    • 2013
  • As the kind of IT service on the internet is more and more diversifying and increasing, IT service's adverse effects also consistently occurring. Among them the incident of private information exposure is becoming social issues, especially the exposure of private information entered on-line resume is very serious. This paper investigates whether or not data is encrypted in data transfer section of major on-line job-search sites of Korea by using the packet analyzer such as "Wireshark." This paper judges whether or not the vulnerability, private information exposure, exists from the result of the investigation above and suggests countermeasures.

Power Allocation of Private and Common Information using Han-Kobayashi Scheme in Interference Channels (간섭 채널에서 Han-Kobayashi 방식의 개인신호와 공용신호의 전력 할당)

  • Paek, Du-Jin;Park, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11A
    • /
    • pp.1038-1044
    • /
    • 2010
  • Interference may severely deteriorate performance in wireless communication. Han-Kobayashi scheme splits each user's signal into private and common information so that the receiver removes the other's common signal for partial interference cancellation. This paper proposes an optimal power allocation to private and common signals for Han-Kobayashi scheme by using required SNR in a private information only system. Numerical results show that the proposed power allocation is quite close to the optimal power allocation based on exhaustive searches.

Factors Influencing the Provision of Personal Information in Electronic Government Services (전자정부서비스에 대한 개인정보제공의 영향요인)

  • Park, Jung Ae;Son, Dal Ho
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.53-73
    • /
    • 2017
  • Frequent outbreak of intrusion of private information is occurring recently not only at portal sites but also in electronic information service of public agencies. Due to these intrusions, it is observed that the citizens tend to avoid providing their private information even to the service for public agencies. Therefore, the object of this research can be explained as demonstrating the influence of the intention of provision for private information to foster the selectronic information ervice of the public agencies. In order to achieve this, this research intends to demonstrate how the experience of the intrusion of the private information affects the concern about the privacy and how the information factor from the public electronic information service has influence on the reliability toward the public. The results showed that the experience of intrusion of privacy, awareness of the danger of privacy, and the sense protection of the information from the manager at public agencies have direct influence on the concern of privacy. Meanwhile, it has been verified that the awareness of information protection of a manager, the systemicity of information protection, and the surveillance and punishment of information protection have influence on the reliability of public agencies.