• Title/Summary/Keyword: 공개영역

Search Result 186, Processing Time 0.023 seconds

A Study on the Use and Protection of Copyrights in Public Archives (공공기록물의 이용과 저작권보호에 관한 연구)

  • Si, Kwi-Sun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.2
    • /
    • pp.159-188
    • /
    • 2009
  • In the midst of computerization and digitization of the archives, the way of use and the need of users to use the public archives has been changed and expanded. It draws concerned party's attention to the copyrights in the public archives and the protection of the copyrights of the public archives. This study examines the exiting copyright laws in Korea and some foreign countries, interprets the laws, and presents legal implications when the laws are applied to the public archives held in the National Archives of Korea(NAK). The public records are "literary works" and their copyrights are to be protected. Most of the public archives held in the NAK are also "creative works" which are the presentations of thoughts and feelings of the individuals, the records creators in the public agencies. The holder of the copyrights of the archives is not the NAK, but the agency which created the archives, such as the central government and local governments. To promote the use of public archives, we need to expand the public domain in the public records and archives and the fair use of the archives. To do this, I suggest to amend and complement the Copyrights Act, the Pubic Records/Archives Management Act, and the Opening Records in the Public Agencies Act(FOIA in Korea). The establishment of a coordinating body dealing the copyrights in pubic record and archives is strongly recommended. The coordinating body will provide guidelines on protecting copyrights and expand the fair use and the public domain of the public archives.

Improvement Measures for Enhancing Professional Safety Sheriff's Specialty (안전보안관 전문성 제고를 위한 개선방안)

  • Park, Jeong-Hun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.175-196
    • /
    • 2019
  • The purpose of this study is to examine the role of safety sheriffs and their necessity in order to improve the activation of safety sheriff's professionalism. Seven security sheriffs were finally selected to discuss their activities and discuss ways to improve their effectiveness. We conducted semi - structured interviews and conducted in - depth interviews with limited data and inadequate prior research. The results of this study are as follows. First, the government should get the help of citizens, citizens and residents. If the state wishes to reduce the number of safety accidents and bring positive results to the public, it should not rely solely on the utilization of institutions. Second, in order to be a safe sheriff with a positive response from the local residents, the activities of the sheriff's sheriff are not only aimed at preventing risks in the environmental domain and reducing the number of accidents, Publicity should be provided to the landlord, tenant, and residents to inform them that the activity is preventive of accident prevention. Third, under the current law, it is necessary to disclose public facilities such as roads, airports, and harbors to the private sector in order to make it possible to monitor school facilities and youth training facilities. Fourth, the safety sheriff is expected to put forward the expectations and positive results of prevention through the beginning of the inspection activities, and the role of the Korean people in becoming psychological stable and efforts to be born as safety experts are required. Finally, it is necessary to establish a concrete manual, strategic safety inspection plan.

A Study on the MOOC Development and Utilization Strategies based on Recognitions of University Members (대학 구성원 인식에 기초한 MOOC 개발 활용 전략 연구)

  • Kang, Kyunghee
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.151-158
    • /
    • 2017
  • This study explored the development and utilization strategies based on the recognition of Massive Open Online Courses(MOOC) of students and professors who are the subjects of university teaching and learning. All members of the university recognized the basic concepts of MOOC as openness, sharing, and participation positively. In the understanding and recognition level of MOOC, undergraduate and graduate students were very low but professors were relatively high. They wanted the MOOC to develop courses in the humanities, natural sciences, social sciences, technology engineering and the arts and sciences, aiming at innovation in college curricula and diffusion of unique contents. The undergraduates wanted MOOC to be able to complete the liberal arts curriculum, basic learning in other areas and extra-curriculum and the graduate students who were lifelong learners wanted MOOC to be developed and utilized for strengthening lifelong education of local citizens. Professors who are providers of high quality education and lifelong learners wanted MOOC to be used for the deepening of their major courses in order to innovate the university education and to spread unique contents. The university should support the development of various MOOCs, establish the completion system, and provide advanced and high quality online education service.

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

A Study on Records management system under enforcement of The Public Records and Archives Management Law in Japan (일본의 공문서관리법 시행에 따른 기록관리 체제 검토)

  • Nam, Kyeong-ho
    • The Korean Journal of Archival Studies
    • /
    • no.30
    • /
    • pp.205-247
    • /
    • 2011
  • The Public Records and Archives Management Law was enacted on June 24, 2009 and was in effect in April 1, 2011. This Act is different from existing Public Archives Law and National Archives Law. Before enacting Public Records and Archives Management Law, Public Archives Law and Information Disclosure Law was the backbone of Japanese Public Records management system. Public Archives Law is composed of management and access for non-active records in Public Archives. Information Disclosure Law is prescribed management of active-records in administrative agency. Public Records and Archives Management Law is the first comprehensive law of managing administrative records including historical records (nonactive-records). The law is prescribed that the public records and archives are intellectual resources shared by citizens and allows people to have more access to them. The law states that public records is basis of democracy and accountability for current and future generation. This article analyzed the relationship of law and its implementing ordinance and Guideline of administrative public records management, and analyzed the law and record-schedule. Furthermore, this article examined significance of the law and democracy, administration's transparency. In accordance with enacting the law, Japanese Public Records Management System will develop. and we must pay close attention to that situation.

Postmodernism and Korean National Archives System since 1999 (기록의 역운 <포스트1999>를 전망하며)

  • Lee, Young-Nam
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.229-280
    • /
    • 2014
  • This essay focused on the critical review of Korean National Archives System(KNAS) since 1999. We think that KNAS could establish the backbone with basic records law on 1999. It's right. But it is not enough for explaining the full historical growth. there are some factors below the growth. This essay tried to the basic three factors below. That means the the demonstration discourse, archival system practices, and archiving technologies in the contexts of the unique standard by the basic records law. These three factors have been the powerful engine for the take-off of KNAS since 1999. However, the powerful history has shadows of growth. This essay narrated the shadows by the frame of 'counter-destiny'. The most dangerous shadow is the loss of archival cultures because the KNAS has been composed of efficiency mentality. That means that KNAS has no unique archival culture for citizenship. So, this essay tried to talk about 'Post1999' to Archives Community.

The Present Status of and Development Plans for Legal Technology in the Fourth Industrial Revolution (4차 산업혁명시대 법정보기술의 현황과 발전방안)

  • Lee, Sung-Jin;Lee, Yeon-Ju;Son, Hyoung-Kun;Kim, Gi-Bum
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.3-21
    • /
    • 2021
  • Klaus Schwab's discussion on the Fourth Industrial Revolution provides a framework for predicting the direction of legal technology development. Technological convergence, which has emerged as the core concept of the Fourth Industrial Revolution has a significant effect on legal technology. In particular, various new technologies, such as legal chatbots and platforms, are being introduced to enhance efficiency and accessibility in the legal field. However, legal technology is still in its early stage, with institutional improvement needed to vitalize the industry. In this paper, we first specify the concept and classification of legal technology in Chapter 2, followed by trends and limitations in Chapter 3 and ways of vitalizing legal technology in the future in Chapter 4. To invigorate legal technology development, it is necessary to put in place legal regulatory measures that stipulate the active disclosure of legal data, such as precedents, and make free use of such measures. In the law, many issues, such as the safety of artificial intelligence, personal information protection, and ethical standards, will be discussed in the future. Therefore, via this paper, we hope to promote the formation of social consensus and prepare countermeasures, such as legislative measures.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

Research on Classification of Human Emotions Using EEG Signal (뇌파신호를 이용한 감정분류 연구)

  • Zubair, Muhammad;Kim, Jinsul;Yoon, Changwoo
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.821-827
    • /
    • 2018
  • Affective computing has gained increasing interest in the recent years with the development of potential applications in Human computer interaction (HCI) and healthcare. Although momentous research has been done on human emotion recognition, however, in comparison to speech and facial expression less attention has been paid to physiological signals. In this paper, Electroencephalogram (EEG) signals from different brain regions were investigated using modified wavelet energy features. For minimization of redundancy and maximization of relevancy among features, mRMR algorithm was deployed significantly. EEG recordings of a publically available "DEAP" database have been used to classify four classes of emotions with Multi class Support Vector Machine. The proposed approach shows significant performance compared to existing algorithms.