Korean Security Protection Law is getting better -certain laws are getting revised,
Those that are applied in 2012 are as follows
1. Prohibit managers from using users’ private information
expiration time of personal information
2. Activate personal information protection law
Encryption of personal information
OECD Privacy Protection
ISTPA’s identity protection frame
IPC’s 10 f
personal information is becoming progressively important. As global Smartphone penetration increases, 80% of Smartphone users are expected to use LBS (by 2013) and the global market for mobile LBS will increase from $2.1 billion (2009) to $18.3 billion by 2015 with the Compound Annual Growth Rate of 43%. Along with the advancement in mobile technology, research into ways of determining the locati
with their existing database, G market can use this source to CRM. This procedure will explained in the following parts.
3.2 ISP& ESCROW&SSL
To ensure the security of E-commerce, G market provides some security program for transaction. This is represented by ISP, ESCROW service. Also, there is a SSL protocol that is used to protect the private information and credit card information.
5. What strengths are evident in the client, and her family, and her community that may serve to help her resolve the problem situation?
- Tracy는 불안증세가 나타나기 이전에는 특별한 질병력도 없었고 행복하고 안정된 가정생활을 누렸으며 은행 파트타임 근무를 했던 점을 미루어보아 대인관계나 사회생활을 하는 데 특별히 어려운
personal data and how phone’s performance satisfy user. Those questions are not too broad or narrow. Because of we can get all of the information from questionnaire.
4. When we get the information from questionnaire. We can use SPSS to analyze it and finally get the answers.
Than we use Brainstorm to range of possible reasons for these 5 questions.
For the first question: a. better appli