RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      클라우드 컴퓨팅 환경 하에서의 개인정보보호 법제도 개선방안 = Study on the protection of personal data under the Cloud computing environment

      한글로보기

      https://www.riss.kr/link?id=T12167297

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Nowadays the development of the Internet is growing rapidly, and it is accepted as big portion of human civilization. The big paradigm of Internet has passed through Web 2.0 and is headed to Web 3.0, which the core technology placed in the center of its Cloud Computing.
      Recently, “cloud computing” has established itself as a new model in the IT industry, and as a new concept whereby companies can freely utilize the third infrastructure as if it were their own infrastructure, instead of developing and using their own proprietary system with their infrastructure. The appearance of new technology like Cloud computer, computer users too not only own the information. Cloud computing is essentially a term given to some new information technology services provided over the Internet. These can include storage of data, provision of software and infrastructure as a utility.
      However, users are very concerned about unforeseen service interruptions or malfunctions as the data is saved and managed by the service operated by the cloud service provider. Also, there is concern about dependency due to leaks of confidential information (as the data is saved outside) and insufficient compatibility among cloud computing.
      There are a number of privacy questions that we need to address when assessing the business case and risks of entering into cloud computing arrangements that extend beyond traditional computing risks.
      Data subjects have a right to know what personal information is held and, in some cases, can make a request to stop processing it. This is especially important with regard to marketing activities; in some jurisdictions, marketing activities are subject to additional regulations and are almost always addressed in the end user privacy policy for applicable organizations. In the cloud, the main concern is the organization’s ability to provide the individual with access to all personal information, and to comply with stated requests.
      The information not only be activated by the Internet energetically but is distributed by various personalized services, but as the information flow, the information becomes out-flowed, distorted and being illegally acquired. Out-flow of the information can occur infringement of one’s privacy, illegal use of one’s Internet ID, and fraud of web documents; forgery and falsification.
      It can also harm other’s life and body as the information society grows more.
      Moreover, as new Internet environment is continuously growing, out-flow of personal information is also growing more, but the awareness of protecting personal information is surprisingly low. New technologies are being developed from country to country but the consciousness of protecting the law is far behind.
      As above facts, I would like to discuss about the Cloud computer that is leading the big change of the Internet atmosphere and would like to discuss about protection of personal information, which the importance is growing, and the way to protect personal information under the new Internet atmosphere of Cloud computer.
      We need to select and discuss target areas and technologies for standardization in detail, in order to secure the interoperability of cloud computing in detail. In particular, the standard framework should be established and applied as quickly as possible to secure cloud computing interoperability among public bodies and between the public and private sectors, with regard to the government’s plan to introduce cloud computing. The government also needs to support the efforts of the private sector to standardize cloud computing.
      This study reviewed various policy protection methods to resolve the privacy concerns that may arise from the perspective of consumers, such as the consumer’s limited right of choice due to insufficient interoperability among cloud computing services.
      However, the market cannot be promoted with protection by the policy. If too excessive obligations are imposed on the service provider to protect the consumers, it could hinder market promotion. Therefore, improvements to the relevant law and policies regarding promotion of the cloud computing market should be made in consideration of market development and maturity; in addition, more diverse policy support is required to promote the market, such as technical development and stimulation of market demand.
      Therefore, various policy support policies designed to promote market demand and strengthen the development capability of service providers should be implemented. The cloud computing market is expected to grow continuously, and its level and scope will be expanded broadly to include mobile devices like a smart phones as well as PC.
      However, unlimited challenges and opportunities are driven by major global companies. As such, local IT companies and Software companies must establish strategies for a new take-off, while the government must respond wisely in the fresh-blown new market.
      번역하기

      Nowadays the development of the Internet is growing rapidly, and it is accepted as big portion of human civilization. The big paradigm of Internet has passed through Web 2.0 and is headed to Web 3.0, which the core technology placed in the center of i...

      Nowadays the development of the Internet is growing rapidly, and it is accepted as big portion of human civilization. The big paradigm of Internet has passed through Web 2.0 and is headed to Web 3.0, which the core technology placed in the center of its Cloud Computing.
      Recently, “cloud computing” has established itself as a new model in the IT industry, and as a new concept whereby companies can freely utilize the third infrastructure as if it were their own infrastructure, instead of developing and using their own proprietary system with their infrastructure. The appearance of new technology like Cloud computer, computer users too not only own the information. Cloud computing is essentially a term given to some new information technology services provided over the Internet. These can include storage of data, provision of software and infrastructure as a utility.
      However, users are very concerned about unforeseen service interruptions or malfunctions as the data is saved and managed by the service operated by the cloud service provider. Also, there is concern about dependency due to leaks of confidential information (as the data is saved outside) and insufficient compatibility among cloud computing.
      There are a number of privacy questions that we need to address when assessing the business case and risks of entering into cloud computing arrangements that extend beyond traditional computing risks.
      Data subjects have a right to know what personal information is held and, in some cases, can make a request to stop processing it. This is especially important with regard to marketing activities; in some jurisdictions, marketing activities are subject to additional regulations and are almost always addressed in the end user privacy policy for applicable organizations. In the cloud, the main concern is the organization’s ability to provide the individual with access to all personal information, and to comply with stated requests.
      The information not only be activated by the Internet energetically but is distributed by various personalized services, but as the information flow, the information becomes out-flowed, distorted and being illegally acquired. Out-flow of the information can occur infringement of one’s privacy, illegal use of one’s Internet ID, and fraud of web documents; forgery and falsification.
      It can also harm other’s life and body as the information society grows more.
      Moreover, as new Internet environment is continuously growing, out-flow of personal information is also growing more, but the awareness of protecting personal information is surprisingly low. New technologies are being developed from country to country but the consciousness of protecting the law is far behind.
      As above facts, I would like to discuss about the Cloud computer that is leading the big change of the Internet atmosphere and would like to discuss about protection of personal information, which the importance is growing, and the way to protect personal information under the new Internet atmosphere of Cloud computer.
      We need to select and discuss target areas and technologies for standardization in detail, in order to secure the interoperability of cloud computing in detail. In particular, the standard framework should be established and applied as quickly as possible to secure cloud computing interoperability among public bodies and between the public and private sectors, with regard to the government’s plan to introduce cloud computing. The government also needs to support the efforts of the private sector to standardize cloud computing.
      This study reviewed various policy protection methods to resolve the privacy concerns that may arise from the perspective of consumers, such as the consumer’s limited right of choice due to insufficient interoperability among cloud computing services.
      However, the market cannot be promoted with protection by the policy. If too excessive obligations are imposed on the service provider to protect the consumers, it could hinder market promotion. Therefore, improvements to the relevant law and policies regarding promotion of the cloud computing market should be made in consideration of market development and maturity; in addition, more diverse policy support is required to promote the market, such as technical development and stimulation of market demand.
      Therefore, various policy support policies designed to promote market demand and strengthen the development capability of service providers should be implemented. The cloud computing market is expected to grow continuously, and its level and scope will be expanded broadly to include mobile devices like a smart phones as well as PC.
      However, unlimited challenges and opportunities are driven by major global companies. As such, local IT companies and Software companies must establish strategies for a new take-off, while the government must respond wisely in the fresh-blown new market.

      더보기

      목차 (Table of Contents)

      • 제 1 장 서 론 1
      • 제 1 절 연구의 필요성 및 목적 1
      • 제 2 절 연구의 범위 및 방법 4
      • 제 2 장 클라우드 컴퓨팅의 개념과 개인정보 침해의 유형 7
      • 제 1 장 서 론 1
      • 제 1 절 연구의 필요성 및 목적 1
      • 제 2 절 연구의 범위 및 방법 4
      • 제 2 장 클라우드 컴퓨팅의 개념과 개인정보 침해의 유형 7
      • 제 1 절 클라우드 컴퓨팅 정의 및 특성 7
      • 제 2 절 클라우드 컴퓨팅 개인정보 침해 유형 17
      • 1. 클라우드 서비스 프로바이더에 의한 개인정보 접근 21
      • 2. 데이터의 임의 수집과 부적절한 모니터링 22
      • 3. 클라우드 서비스 프로바이더에 의한 데이터의 임의적 이전 23
      • 4. 데이터의 무단 공유 및 상업적 이용 24
      • 제 3 장 클라우드 컴퓨팅 개인정보보호의 개요 27
      • 제 1 절 개인정보의 개요 27
      • 제 2 절 개인정보보호의 법적 기초 31
      • 1. 개인정보보호와 기본권 31
      • 2. 사생활의 비밀과 자유의 연역 32
      • 3. 사생활의 비밀과 자유의 내용 36
      • 4. 사생활의 비밀과 자유의 한계 41
      • 제 3 절 클라우드 컴퓨팅 환경에서의 기존 개인정보보호법의 문제점 44
      • 1. 국내 법․제도 및 인증현황 45
      • 2. 현재 법․제도의 클라우드 컴퓨팅 서비스 환경 적용 시 이슈 52
      • 제 4 장 클라우드 컴퓨팅 환경하에서 주요국의 개인정보보호 법제 60
      • 제 1 절 OECD 60
      • 제 2 절 EU 개인정보 보호지침 64
      • 제 3 절 미국 71
      • 1. 전기통신 프라이버시법(ECPA) 73
      • 2. 의료보험의 이전과 그에 수반되는 책임에 관한 법(HIPPA) 74
      • 3. 사베인스-옥슬리 법 75
      • 제 4 절 일본 75
      • 1. 고도 정보통신 네트워크 사회 형성 기본법 76
      • 2. 개인정보보호 관련 법률 77
      • 3. 사이버범죄 관련 법률 78
      • 제 5 장 클라우드 컴퓨팅 개인정보보호 법·제도 개선 필요성 및 방안 79
      • 제 1 절 클라우드 컴퓨팅 환경에서의 개인정보보호 법․제도 개선 필요성 79
      • 제 2 절 클라우드 컴퓨팅 환경에서의 개인정보보호 법․제도 개선방안 86
      • 1. 현재의 KISA ISMS 인증제도를 활용하는 방안 89
      • 2. 클라우드 컴퓨팅 서비스 제공자에 특화된 독립적인 인증제도 도입 90
      • 제 6 장 결 론 92
      • 참고문헌 97
      • ABSTRACT 103
      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼