Korean Security Protection Law is getting better -certain laws are getting revised,
Those that are applied in 2012 are as follows
1. Prohibit managers from using users’ private information
expiration time of personal information
2. Activate personal information protection law
Encryption of personal information
OECD Privacy Protection
ISTPA’s identity protection frame
IPC’s 10 f
personal information. They have to wait until the product is delivered and if the product is unsatisfying their expectation or has a defect itself, consumers have to return or exchange items, which will cause huge inconvenience for them
- Controlling activities: In order to provide a high quality customer experience, Blue Nile has to continue to invest substantial amounts of resources in our web
Protection Campaign Before Good Downloader Campaign (2007~2008)
2007.12.19 Film & Media relatives cooperative campaign signed
Sponsor : CJ E&M, Show Box, CGV, Lotte Cinema, Mega Box, NHN, PIFF, JIFF, PiFan, CHIFFS
New PR film making and distributing
: ‘dual personality report’
Segmenting Target Audience, making about 30 movies relatively to target
information systems and networks. Although the guideline is subject to further review, it proposes 9 principles that each member state should adopt to promote a culture of security.
The principles are:
Awareness: Participants should be aware of the need for security of information systems and networks and what they can do to enhance security, they also should be aware of the potential harm to
activities. So we interference will be minimal.
Study setting: noncontrived and field study.
This is a field study where we will collect the data from various users and correlated them to the satisfaction of the phone and phone’s performance. Research here is done in a noncontrived setting with non interference with the user’s activities.
Unit of analysis: individuals
We want to k