RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
          펼치기
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        정보통신기술의 발전과 개인정보 보호

        손영화 한국기업법학회 2022 企業法硏究 Vol.36 No.1

        Humans value being protected in the areas of privacy and personal life. I want to be able to control who knows what about themselves. I don't want anyone to have access to their personal information at any time. However, recent advances in information and communication technology threaten privacy, reduce control over personal information, and open the possibility of various negative consequences as a result of access to personal information. In the late 20th century, a data protection system was established in response to an increase in the level of personal information processing. In the 21st century, the strength of the platform economy is beginning with the rise of big data and advanced information technology (e.g., in the form of deep learning), the rise of big tech companies, and the storage and processing of exabytes of data. Technical features are currently in place to collect, store and retrieve large amounts of data on phone calls, Internet searches, and electronic payments, and are routinely used by both government agencies and business actors. The large-scale use and spread of advanced digital technology for the rise, surveillance and control of China has raised concerns among many people. For companies, personal information about customers and prospects is now a key asset. The scope and purpose of the privacy-oriented business models of big tech companies such as Google, Amazon, Facebook, Microsoft, and Apple are often referred to as "monitoring capitalism." This paper compares and examines legislative precedents and theories of the United States, Japan and other countries, focusing on the EU, and examines the issues of personal information protection accompanying the development of new information and communication technologies. A brief summary is as follows: Appropriate regulation and protection must be implemented while accurately recognizing the impact of new technologies on personal information and privacy. First, there is the problem of regulating the use of so-called cookies with regard to Internet privacy. It will be necessary to find a point of contact to achieve information sharing and sharing efficiency without over-infringement of individual privacy. Second, it is necessary to address the issue of privacy in the development of cloud computing in an internationally consistent manner. Third, there is the problem of protecting personal information through the utilization of big data. In particular, the extent to which individual privacy protection is permitted is a problem when using so-called predictive information. It is also necessary to come up with a concrete plan to ban the use of predictive information by case rather than a general plan to ban the use of predictive information. Fourth, with the development of the Internet of Things, the possibility of infringement of personal information is increasing. Utilization of location information using GPS is one of them. Generally, the acquisition and use of personal information using “reconfigurable technology” can be solved by informing individuals of such information. Fifth, the development of information and communication technology can bring about changes in the voting process. This is the so-called e-governance or e-government. Electronic democracy should be achieved by allowing voters to vote freely and secretly at any stage, and by preventing the sale and coercion of votes. Finally, the so-called surveillance capitalism, which is a reaction to the development of security systems using surveillance cameras, should be resolved. At least national surveillance of citizens should be strictly prohibited, and laws and systems should be established to inform the public of such surveillance facts and prevent personal privacy from being violated when using information. 인간은 사생활과 개인 삶의 영역을 보호받는 것을 중요시한다. 자신의 개인정보에 대하여 언제든지 누구라도 접근할 수 있는 것을 원하지 않는다. 또한 타인이 자신에 대해 무엇을 알고 있는지에 대하여 통제할 수 있기를 원한다. 그러나 최근 정보통신기술의 발전은 프라이버시를 위협하고 개인정보에 대한 통제력을 감소시키며 개인정보에 대한 다양한 접근의 결과로 인한 부정적인 결과가 발생할 가능성이 있다. 20세기 후반에는 개인정보의 처리 수준 증가에 대한 대응으로 데이터 보호체제가 구축되었다. 21세기는 빅데이터와 첨단 정보기술(예: 딥러닝의 형태), 빅테크 기업의 부상과 엑사바이트급 데이터 저장 및 처리와 함께 플랫폼 경제의 세기가 시작되고 있다. 전화 통화, 인터넷 검색 및 전자 결제에 관한 대량의 데이터를 수집, 저장 및 검색할 수 있는 기술적 기능이 현재 마련되어 있다. 정부 기관과 기업 행위자 모두가 그러한 기술을 일상적으로 사용하고 있다. 중국의 부상과 감시와 통제를 위한 첨단 디지털 기술의 대규모 사용과 확산은 많은 사람들의 우려를 자아내고 있다. 기업에게는 고객과 잠재 고객에 대한 개인정보가 이제 핵심 자산이기도 하다. 빅테크(Google, Amazon, Facebook, Microsoft, Apple)의 개인정보 중심 비즈니스 모델의 범위와 목적은 ‘감시 자본주의’라는 표현을 자아내기도 한다. 이상에서는 EU를 중심으로 미국, 일본 등의 입법과 판례 및 학설을 비교고찰하며 새로운 정보통신기술의 발전에 따른 개인정보 보호의 과제를 살펴보았다. 간략하게 요약 정리하면 다음과 같다. 신기술의 홍수 속에서 그것이 개인정보와 프라이버시에 미치는 영향에 대해 정확히 인식하면서 적절한 규제와 보호가 이루어질 필요가 있다. 우선, 인터넷 프라이버시(Internet privacy)와 관련하여 이른바 쿠키(cookies)의 사용에 관한 규제의 문제가 있다. 개인의 프라이버시를 과도하게 침해하지 않으면서 정보공유 및 공유효율성을 달성하기 위한 접점을 찾아야 할 것이다. 둘째, 클라우드 컴퓨팅의 발달에 따른 개인정보 보호의 문제에 대해 국제정합성 있는 규범의 마련을 위한 노력이 경주되어야 할 것이다. 셋째, 빅데이터의 이용 및 활용에 따른 개인정보 보호의 문제가 있다. 특히, 이른바 예측정보의 활용에 있어서 개인의 프라이버시 보호를 어느 범위에서 인정할 것인지가 문제된다. 예측정보의 일반적인 활용금지의 방안이 아닌 구체적인 사안별 금지방안을 마련할 필요도 있다. 넷째, 사물인터넷의 발전에 따라 개인정보의 침해 가능성도 높아지고 있다. GPS를 이용한 위치정보 등의 이용과 활용도 그러한 내용 중의 하나이다. 일반적으로 ‘재구성 가능한 기술(reconfigurable technology)’을 사용한 개인정보의 취득 및 이용의 경우 그러한 기술의 정보에 대하여 개인에게 알려주는 방법에 의하여 이를 해결할 수 있을 것이다. 다섯째, 정보통신기술의 발전은 투표 과정에서의 변화를 초래할 수 있다. 이른바 E-거버넌스 또는 전자정부의 과제이다. 어느 단계에서의 기술이용이든지 간에 유권자의 자유투표 및 비밀투표가 이루어질 수 있도록 하여 투표매매와 강요를 방지함으로써 전자 민주주의를 달성하여야 할 것이다. 마지막으로 감시카메라 등을 이용한 보안시스템의 발전에 따른 반작용이라고 할 수 있는 이른바 감시 자본주의를 해결하지 않으면 안된다. 적어도 국가에 의한 대중의 감시는 엄 ...

      • KCI등재

        From Information to Knowledge: The Information Literacy Conundrum

        Ross J. Todd 한국문헌정보학회 2010 한국문헌정보학회지 Vol.44 No.4

        The fusion of learning, information, and technology presents dynamic challenges for all librarians, educators and students in 21st century libraries and schools. At the heart of this fusion is the growth of a pervasive, integrated information environment characterized by vast quantities of digital content, open choice, collaborative and participatory digital spaces, and the transition of the web environments from consumption of information to creation of information. This environment heralds important opportunities for librarians and teachers to rethink, re-imagine and recreate a dynamic approaches to information literacy instruction. Drawing on an extensive body of research undertaken through the Center for International Scholarship in School Libraries (CISSL), and published research on both information literacy and constructivist learning, this paper provides a critical examination of the current status of information literacy: its multiple conceptualizations, competing models, viewpoints, and its operationalizations in educational and library environments. The paper will challenge information literacy practices which center on simplistic, reductionist approaches to information literacy development, and the separation of information process and knowledge content. In particular it will address apparent contradictions in espoused conceptions of information literacy which revolve around “knowledge”: knowledge construction, critical thinking, problem solving and the development of knowledgeable people; and information literacy practices which revolve around “information”: a predominant focus on skills of access and evaluation of resources and with less attention given to engaging with found information to develop deep knowledge and understanding. The paper will present a series of challenges for moving forward with information literacy agendas in libraries and schools. 

      • KCI등재

        Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

        Lee, Yon-Nim,Kwon, Oh-Byung The Korea Society of Management Information System 2010 Asia Pacific Journal of Information Systems Vol.20 No.2

        Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we out

      • DOES WOM INFORMATION HINDER CONSIDERATION OF OTHER BRANDS?

        Kaichi Saito 글로벌지식마케팅경영학회 2014 Global Marketing Conference Vol.2014 No.7

        Consumers receive two types of WOM (word-of-mouth) information: instructional- type WOM and information-type WOM. The instructional-type WOM is WOM information about brands that have not been purchased, while the information-type is WOM about brands have been purchased before. By receiving the instructional-type WOM, consumers come to understand the functional and psychological benefits of the brand. On the other hand, consumers learn nothing about the functional and psychological benefits from information-type WOM, since they already know these benefits through their experience. The information-type WOM about a brand informs consumers that the WOM sender has used the brand and wants to talk about his/her consumption experience of the brand. Although previous research has actively investigated the effects of instructional-type WOM (e.g., Jang, Prasad, and Ratchford 2012; Liu 2006; Zhu and Zhang 2010), the effect of informational-type WOM remains virtually unexplored. When receiving information-type WOM about a brand from friends or family members, consumers are more likely to use the brand in order to build a closer relationship, and therefore fulfill their need to belong. Information-type WOM about a brand from significant others can inhibit consideration of other brands. When a person has the goal of fulfilling the belonging need, only purchasing the same brand as significant others purchase will contribute to satisfying this goal. Purchasing other brands will hinder achievement of the goal, and this impedes their consideration of other brands. The author examined the effect of information-type WOM on consideration set formation using the survey data provided by Yomiuri Advertising Company. The empirical analysis revealed that (1) information-type WOM has a greater impact on consideration than ISP and advertising (i.e., positive own-effect) and (2) information-type WOM has the effect of blocking the entry of other brands into the considerations set (i.e., negative cross-effect). These results suggest that, even for major brands, it is important to generate WOM among consumers. Although information-type WOM might seem to be trivial, this type of WOM function as means to avoid competition in consumers’ consideration sets.

      • KCI등재

        Research on Effective Information Visualization Method Based on Mobile Web

        Jina YOO,Tae-Hyeong KIM 한국유통과학회 2020 The Journal of Industrial Distribution & Business( Vol.11 No.7

        Purpose: The purpose of this study is to recognize the role and necessity of public data visualization through prior research, investigation, and data verification processes. In addition, this study intends to check what factors should be considered in order to visualize data on the mobile web. Through this process, by identifying the cognitive load affecting information visualization by type, as a result, I would like to propose an effective information visualization method to effectively deliver public data related to government policies. Research design, data and methodology: In this study, we analyzed the case of information visualization according to infographics, which has been widely used in the public field among various visualization methods. For this study, a questionnaire survey was conducted for young people in their 20s and 30s with the highest mobile usage rate. Results: Based on the results, IPA (Importance Performance Analysis) was performed to conduct cognitive load test tools for information visualization of public data and confirmed the implications for each type of infographics. Conclusions: As a result of research, in order to efficiently deliver public data on the mobile web, first, it is necessary to construct a visual screen that can be easily identified through clear data. Appropriate graphic elements can be used according to the type to make it easier for users to acquire and understand information. Second, it is necessary to provide useful content in visualizing information. Third, in order to efficiently transmit information and increase understanding of data, it is necessary to visualize information that can induce interest in data and form metaphors. Fourth, it is necessary to visualize information to reduce cognitive load in terms of physical and mental aspects in order to accommodate users' comfortable information. Fifth, in order to effectively deliver public data, it is necessary to compose contents and information that are easy for users to understand. This study examines effective information visualization methods to increase the communication effect of public data in response to changes in the data-based intelligent information society and suggests implications for each type considering cognitive loads to help future public institutions to communicate and accept information.

      • KCI등재후보

        Utilization of Administrative Informationand Protection of Personal Information

        이민영 가천대학교 법학연구소 2011 가천법학 Vol.4 No.3

        Current discussions on the protection of personal information were first raised in the realization process of the administration procedure which purports to secure fairness, transparency and trustworthiness of public service and to guarantee of citizen’s rights. The administrative procedure aims to achieve democracy, appropriateness, and efficiency in public service by promoting participation of general public in administrative affairs, so it is essential that the general public gets access to the administrative information held by public offices. However, as it becomes possible for an individual to provide administrative information to offices or to get access to it, and/or even to disclose certain administrative information to general public, it is required that proper legal restriction of those uses which by their characters contain private information. Therefore, previous system of administrative information disclosure and protection which functioned under each related procedures, came to be re-established as a separate set of regulations on the treatment of administrative information in the information society. Some of the background concerns are that development of information technology which established the electronic government increases the possibility of leakage of digitalized private information by making individual information to be managed electronically as a whole, and that disclosure and sharing of administrative information which is the fundamental principle of the electronic government may, by its own character, conflict with protection of personal information. Accordingly, it is required to apply and enforce the regulation in a way that does not cause conflict among the Constitutional Right to knowledge, administrative demand and protection of personal information. In this regard, this paper studies appropriateness of restriction on the right of information subjects with respect to personal information as a reverse function of first, sharing of administrative information by the computer system and networks through which speed and accuracy of communication of information is secured, geological and time limitation is overcome and paperwork is reduced, and secondly, of the collection of image information by CCTV for the purpose of crime prevention and police force workload reduction. While information privacy is the right to privacy as an object of corresponding categories and power related to personal data and interpreted as a positive means to organize form a harmonious relationship between legal protection and lawful utilization, it is crucial to form legitimate the legal relationship of rights and obligations free from the fixed idea of denial and disbelief about personal information manager such as government or private companies first of all. As a result, it is required to set up a thick layer of protection to be protected and rationally use to be used for establishing institutional framework on redefining information privacy. This article, in this basis, argues the amendment of EGA and IPA with information-related law and data protection principles for constitutional legislative system of information privacy.

      • KCI등재

        Cognitive Processing with Information Visualization Types and Contextual Reasoning

        Wonjin Jung(정원진) 한국데이타베이스학회 2007 Journal of information technology applications & m Vol.14 No.4

        The effects of information quality and the importance of information have been reported in the Information Systems (IS) literature. However, little has been learned about the impact of information visualization types and contextual information on decision quality. Therefore, this study investigated the interaction effects of these variables on decision quality by conducting a laboratory experiment. Based on two types of information visualization and the availableness of contextual information, this study had a 2 x 2 factorial design. The dependent variables used to measure the outcomes of decision quality were decision accuracy and time. The results demonstrated that the effects of contextual information on decision quality were significant. In addition, there was a significant main effect of information visualization on decision accuracy. The findings suggest that decision makers can expect to improve their decision quality by enhancing information visualization types and contextual information. This research may extend a body of research examining the effects of factors that can be tied to human decision-making performance.

      • KCI등재

        금융회사 정보보안정책의 위반에 영향을 주는 요인 연구

        이정하(Jeong-Ha Lee),이상용(Sang-Yong Tom Lee) 한국데이타베이스학회 2015 Journal of information technology applications & m Vol.22 No.4

        This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees’ perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

      • KCI우수등재

        미디어 이용자의 정보 검색과 공유 행동에 관한 연구 : 성격 특성과 디지털 리터러시의 역할

        이하나(Hana Lee),황유리(Yoori Hwang),정세훈(Se-Hoon Jeong) 한국언론학회 2021 한국언론학보 Vol.65 No.1

        Information seeking and sharing are important media behaviors, particularly when using online and social media. This study examined information seeking and information sharing behaviors among media users, and how those behaviors could be predicted by user characteristics(e.g., big five personality, need for cognition, and sensation seeking) and digital literacy(e.g., prosumption literacy and consumption literacy). We conducted an online survey of 698 adults 20 to 60 years of age. With regard to user characteristics, the results showed that extraversion was a positive predictor for both information seeking and sharing, while neuroticism was a positive predictor for information seeking only. The results suggest that extraverts tend to seek and share more information. Digital literacy played an interesting role in information seeking and sharing. Consumption literacy was a positive predictor of information seeking, whereas prosumption literacy was a positive predictor of information sharing. The findings of this present research suggest that the ability to use new media (i.e., consumption literacy) is important for information seeking behavior, whereas the ability to create content (i.e., prosumption literacy) is important for information sharing behavior. The role of digital literacy in information seeking and sharing has important theoretical as well as practical implications. Although it is theoretically and academically meaningful to predict and explain the role of demographic and psychological factors in information seeking and sharing, it is difficult to change or control those demographic and psychological factors. In other words, even if we know that extraversion is a positive predictor of information seeking/sharing, it is difficult to change one’s personality to an extravert in order to increase information seeking/sharing. On the other hand, the role of digital literacy is practically meaningful such that we could increase media users’ information seeking and sharing behaviors by enhancing their digital literacy. Specifically, consumption literacy could increase information seeking, whereas prosumption literacy could increase information sharing, which suggest the importance of digital literacy education. These results have important theoretical implications because information seeking could be linked to research on the digital divide and knowledge gap; and information sharing could contribute to research on information diffusion and opinion leadership in the two-step flow theory. From a practical perspective, understanding the type of individuals who tend to seek and share information could help media practitioners to develop effective communication strategies. For example, based on users’ personality traits and digital literacy skills, news organizations or advertisers could design messages that are tailored to users who tend to seek and share more information.

      • KCI등재후보

        전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계

        김동수,전남재,김희완 (사)디지털산업정보학회 2010 디지털산업정보학회논문지 Vol.6 No.4

        The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British’s ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT’s information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies’ financial and information security and to prevent from any risk of exposing the companies’ information.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼