Korean Security Protection Law is getting better -certain laws are getting revised,
Those that are applied in 2012 are as follows
1. Prohibit managers from using users’ private information
expiration time of personal information
2. Activate personal information protection law
Encryption of personal information
OECD Privacy Protection
ISTPA’s identity protection frame
IPC’s 10 f
Protection Campaign Before Good Downloader Campaign (2007~2008)
2007.12.19 Film & Media relatives cooperative campaign signed
Sponsor : CJ E&M, Show Box, CGV, Lotte Cinema, Mega Box, NHN, PIFF, JIFF, PiFan, CHIFFS
New PR film making and distributing
: ‘dual personality report’
Segmenting Target Audience, making about 30 movies relatively to target
information is best regarded as restricted, and it is wisely made available only to those who need to know. A more complete reference available on a restricted basis can be found in ICAO 1992 (Security Manual).
The gravity of the illegal acts against airlines and airports is such that it is now accepted that countermeasures must be of international concern. The report of the U.S. President's Co
There is a consumer decision-making process, as you can see.
The consumer decision-Making Process consists of 5 steps like this picture.
For example, 은주 want her phone to change smart phone. This step is a problem recognition.
So, 은주 collect information by searching Internet, listening to advices of her friends who are using them, watching advertisement, or visiting a store, or some
information services using personal information is becoming progressively important. As global Smartphone penetration increases, 80% of Smartphone users are expected to use LBS (by 2013) and the global market for mobile LBS will increase from $2.1 billion (2009) to $18.3 billion by 2015 with the Compound Annual Growth Rate of 43%. Along with the advancement in mobile technology, research into way