JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Redundancy assessment of PIMS and PIPL by parsing
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Redundancy assessment of PIMS and PIPL by parsing
Kim, So-Ra; Kim, Tae-Sung;
  PDF(new window)
 Abstract
As infringement accidents of personal information have often occurred and estimates of damages are too large, the government introduces many certifications related with personal information management system for protecting personal information. Among them, PIMS and PIPL share many points in common, so many complaints about duplicate regulation have been suggested. This study evaluates the duplication of two certifications in order to examine redundancy between PIMS and PIPL both of which have been controversial.
 Keywords
IMS;PIPL;redundancy assessment;parsing;
 Language
Korean
 Cited by
 References
1.
Korea Local Information Research & Development Institute, "Countermeasure of public institution of introduction of PIPL," 2014 Local Information Issue, Vol. 2, 2014.

2.
Boannews, "Visualization of integration of information security certification... What is priority?," 2014.8.11.

3.
Korea Internet & Security Agency, Outline of PIMS, Retrieved Oct. 21, 2015, from http://pims.kisa.or.kr/kor/intro/pimsIntro01.jsp.

4.
Korean Standard Dictionary, Retrieved Nov. 2, 2015, from http://stdweb2.korean.go.kr.

5.
M. Landau, "Redundancy, rationality, and the problem of duplication and overlap," Public Administration Review, Vol. 29, pp. 346-358, 1969. crossref(new window)

6.
Jung-hai Kim, "A Study on the Reform of the overlapping regulation in the industrial safety sector," Korean Society and Public Administration, 15(1), pp. 211-233, 2004.

7.
Korea Ministry of Government Legislation, A study on Status and Improvement of duplicate regulation, 2008.

8.
Datanet, "ISMS, maintaining certification is more important than certification." 2013.10.7.

9.
Mi-na Sim, "(A) study on the implementation methodology of the efficient PIMS certification system," Ph.D. Thesis, Korea University, 2010.

10.
Heung-youl Youm, "The necessity of international standardization of personal information management system," Review of The Korea Institute of information Security & Cryptology, 23(4), pp. 65-72, 2013.

11.
Dong-hee Bang, "A study on the improvement of the personal information protection certification in the personal information protection legal system: Focusing on the current status, the problem, and the remedial alternative of certificate system," Public Law Journal, 15(1), pp. 263-300, 2014.

12.
Geon-sang Cha, Ho-hyeon Han, and Yong-tae Shin, "An effective Personal information management system to ensure self-imposed control on personal information protection act," Journal of Korean Institute of Information Scientists and Engineers: Information networking, 39(3), pp. 276-281, 2012.

13.
Eun-yeop Park, Jin-won Choi, and Tae-hee Cho, "A case study on building personal information management System Certification," Review of The Korea Institute of information Security & Cryptology, 21(5), pp. 27-36, 2011.

14.
Jin-hwan Jeon and Kang-rae Cho, "The main changes in personal information management system certification by revised notification," Review of The Korea Institute of information Security & Cryptology, 23(5), pp. 20-23, 2013.

15.
Dae-ha Park and Keun-hee Han, "A Study on PIMS Controls for PII outsourcing management under the cloud service environment," Jonornal of The Korea Institute of information Security & Cryptology, 23(6), pp. 1267-1276, 2013. crossref(new window)

16.
Jeong-woo Chae and Jin-hong Jeong, "Study on building security controls framework for the industrial security management system," Korean Academy of Public Safety and Criminal Justice, 22(1), pp. 300-341, 2013.

17.
Jin-young Han and Su-jin Lee, "Privacy assessment model in healthcare: The case of specialty hospital," Journal of Internet Electronic Commerce Research, 14(6), pp. 27-44, 2014.

18.
Dae-ha Park, Sang-nyeong Yoo, and Heung-youl Youm, "Development of information system operational audit checklist for personal information protection in public organizations," Journal of Security Engineering, 12(1), pp. 47-64, 2015. crossref(new window)

19.
K. Hone and J.H.P. Eloff, "Information security policy - what do international information security standards say?," Computers & Security, Vol. 21, No. 5, pp. 402-409, 2002. crossref(new window)

20.
M. Siponen and R. Willison, "Information security management standards: Problems and solutions," Information & Management, Vol. 46, No. 5, pp. 267-270, 2009. crossref(new window)

21.
Woon-soo Kim, Sook-young Jeong, Young-hyeon Cho, and Kyung-bae Kim, "A Study on improving scheme of environmental review aspects in urban management planning in Seoul," Seoul Studies, 8(1), pp. 107-125, 2007.

22.
Korea IT Industry Promotion Agency, Report on Hw to Link a Similar Procedure for the Expansion of Digital Content Transaction Certification, 2008.

23.
Hong-bin Im et al., Parsing Methodology of Korean, Hankookmunhwasa, 2002.

24.
Jin-jae Choi and Sun-young Hwang, "Requirements redundancy and inconsistency analysis for use case modeling," Journal of KIISE: Software and Applications, 3(7), pp. 869-882, 2004.