• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 개인정보 ]" (12)
  1. 1. A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel
  2. 2. A Blockchain-based User Authentication Model Using MetaMask
    Nakhoon Choi, Heeyoul Kim, Vol. 20, No. 6, pp. 119-127, Dec. 2019
    10.7472/jksii.2019.20.6.119
    Keywords: Blockchain, Ethereum, authentication, MetaMask, Personal Imformation, Decentralize
  3. 3. A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations
  4. 4. A Study on the Management Capabilities Enhancement of Consignor's Personal Information Protection
  5. 5. A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
    Younsung Choi, Oh-Geol Kwon, Dongho Won, Vol. 17, No. 2, pp. 77-86, Apr. 2016
    10.7472/jksii.2016.17.2.77
    Keywords: Internet cookie technology, Personal information security, Privacy, Right to be forgotten
  6. 6. A Study on the Organization and Authority of the Personal Information Protection Commission
  7. 7. Overview of Personal Information Protection Act in Korea
    Ilhwan Kim, Jaeho Sung, Vol. 16, No. 4, pp. 141-148, Aug. 2015
    10.7472/jksii.2015.16.4.141
    Keywords: IT, Personal Information, Personal Information Protection Act, Right to Informational Self Determination, E Government
  8. 8. An Empirical Study on Concern for Information Privacy for Smart Phone Users
    Jaejung Lee, Vol. 15, No. 5, pp. 53-62, Oct. 2014
    10.7472/jksii.2014.15.5.53
    Keywords: M-Commerce
  9. 9. Analysis of the Facebook Profiles for Korean Users: Description and Determinants
    Mina Lee, Seungah Lee, Inhye Choi, Vol. 15, No. 2, pp. 73-86, Apr. 2014
    10.7472/jksii.2014.15.2.73
    Keywords: Facebook, Facebook profiles, Personal Information, privacy concern
  10. 10. A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory
    Chanouk Park, Sang-Woo Lee, Vol. 15, No. 2, pp. 59-72, Apr. 2014
    10.7472/jksii.2014.15.2.59
    Keywords: Privacy, Privacy protection behavior, protection motivation theory, Privacy Act