A Study on Information Security Management with Personal Data Protection

被引:5
|
作者
Huang, Chien-Cheng [1 ]
Farn, Kwo-Jean [2 ]
Lin, Frank Yeong-Sung [1 ]
机构
[1] Natl Taiwan Univ, Dept Informat Management, Taipei 10764, Taiwan
[2] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu, Taiwan
关键词
Information exchange; ISMS; information sharing; personally identifiable information; standardization;
D O I
10.1109/ICPADS.2011.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the process of standardization, whether the announcement of a standard represents a cause or an outcome, it is opportunity of the trend of standardization or achievement. The process of standardization is to understand "why" and "how" to explore the detailed outline of a time flow. From a long-term perspective, a standard is the milestone of the standardization process. On May 26th 2010, with the announcement of the Personal Data Protection Act in Taiwan, information security management (ISM) of the Personal Data Protection Act has received much attention from the public. This study is centered on the working items of standards announced by the International Organization for Standardization (ISO) and the ongoing information security management system (ISMS) standards and standardization in order to propose standards which comply with the ISMS of the Personal Data Protection Act and methods which increase implementation control measures.
引用
收藏
页码:624 / 630
页数:7
相关论文
共 50 条
  • [1] The protection of personal data and the security of information
    Ribagorda Garnacho, Arturo
    REVISTA JURIDICA DE CASTILLA Y LEON, 2008, (16): : 373 - 399
  • [2] Information security and protection of personal data
    Siskin, Dilan Serife
    TURKISH LIBRARIANSHIP, 2018, 32 (04) : 342 - 345
  • [3] Protection of Personal Information Security in the Age of Big Data
    Zou, Hui
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
  • [4] Information Security Management in Higher Education Institutions in Compliance with the Organic Law for the Protection of Personal Data
    Estacio, Karen
    INNOVATION AND RESEARCH-SMART TECHNOLOGIES & SYSTEMS, VOL 2, CI3 2023, 2024, 1041 : 110 - 121
  • [5] SPORTS DATA PRIVACY PROTECTION AND INFORMATION SECURITY MANAGEMENT
    Jin, Biao
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (05): : 4390 - 4398
  • [6] SECURITY MANAGEMENT AND PROTECTION - A PERSONAL APPROACH
    LIST, W
    COMPUTER JOURNAL, 1984, 27 (03): : 285 - 285
  • [7] SECURITY MANAGEMENT AND PROTECTION - A PERSONAL APPROACH
    WILKES, MV
    COMPUTER JOURNAL, 1984, 27 (01): : 3 - 7
  • [8] Protection Profile of Personal Information Security System Designing a Secure Personal Information Security System
    Lee, Hyun-Jung
    Lee, Kwangwoo
    Won, Dongho
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 806 - 811
  • [9] Information security and data protection
    Qureshi, AA
    Siegel, JG
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2001, 14 (1-3) : 1 - 16
  • [10] Internet Security Protection in Personal Sensitive Information
    Wang, Yubin
    Li, Chao
    Cheng, Nan
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 628 - 632