A Study on Information Security Management with Personal Data Protection

被引:5
|
作者
Huang, Chien-Cheng [1 ]
Farn, Kwo-Jean [2 ]
Lin, Frank Yeong-Sung [1 ]
机构
[1] Natl Taiwan Univ, Dept Informat Management, Taipei 10764, Taiwan
[2] Natl Chiao Tung Univ, Inst Informat Management, Hsinchu, Taiwan
关键词
Information exchange; ISMS; information sharing; personally identifiable information; standardization;
D O I
10.1109/ICPADS.2011.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the process of standardization, whether the announcement of a standard represents a cause or an outcome, it is opportunity of the trend of standardization or achievement. The process of standardization is to understand "why" and "how" to explore the detailed outline of a time flow. From a long-term perspective, a standard is the milestone of the standardization process. On May 26th 2010, with the announcement of the Personal Data Protection Act in Taiwan, information security management (ISM) of the Personal Data Protection Act has received much attention from the public. This study is centered on the working items of standards announced by the International Organization for Standardization (ISO) and the ongoing information security management system (ISMS) standards and standardization in order to propose standards which comply with the ISMS of the Personal Data Protection Act and methods which increase implementation control measures.
引用
收藏
页码:624 / 630
页数:7
相关论文
共 50 条
  • [41] INFORMATION PROTECTION OF PERSONAL DATA: THE THREAT DOMINANT SOURCE
    Ershov, V. N.
    Smirnova, P. L.
    BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2012, 20 (02): : 71 - 76
  • [42] Study of Information System Security of Government Data Center Based on the Classified Protection
    Qian, Li
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 1315 - 1319
  • [43] Study on the application of digital certificates in the protection of network information security and data integrity
    Li, H. (493885444@qq.com), 1600, Academy Publisher, P.O.Box 40,, OULU, 90571, Finland (08):
  • [44] Data protection and information security in biomedical research: A sequential explanatory mixed study
    Farah, Marialida
    Helou, Samar
    Raad, Elie
    El Helou, Elie
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2024, 192
  • [45] Comparative Study of the Protection of Personal Credit Information
    Wu Yu
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON PUBLIC ADMINISTRATION (7TH), VOL I, 2011, : 628 - 635
  • [46] Implementation of Personal Information Security Protection Technology Based on Block Chain
    Wei, Xu
    Jing, Leng
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 243 - 246
  • [47] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
  • [48] Cyber Security and Habeas Data:The Latin American Response to Information Security and Data Protection
    Parraguez Kobek, Luisa
    Caldera, Erick
    OASIS-OBSERVATORIO DE ANALISIS DE LOS SISTEMAS INTERNACIONALES, 2016, (24): : 109 - 128
  • [49] Economics of Personal Data Management: Fair Personal Information Trades
    Tasidou, A.
    Efraimidis, P. S.
    Katos, V.
    NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 151 - +
  • [50] The future of personal information management in the age of ubiquitous personal data
    Whittaker, Steve
    Rader, Emilee
    Bergman, Ofer
    HUMAN-COMPUTER INTERACTION, 2025,