• Title/Summary/Keyword: 권리정보

Search Result 487, Processing Time 0.023 seconds

Intellectual Freedom Issues in Library Collection Development (장서개발에 있어서 지적자유의 문제)

  • Chang, D.H.
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.1
    • /
    • pp.165-182
    • /
    • 2011
  • This paper attempts to portray the issues of intellectual freedom that confront librarians in developing collections in libraries. It is observed that the issue has hardly been drawn attention in Korea while, from various cases, concerns about intellectual freedom have been increased in many countries. Situated in this observation, this paper surveys various aspects of endeavors to protect intellectual freedom in information service settings. It is also stressed how such issues as free access to information, freedom to know, information barriers in public sectors, and freedom of expression are addressed in library world. Emphasis was also put on the meaning of intellectual freedom as viewed through some policy documents and guidelines in other countries and its implications.

Quantitative Analysis of LTE Essential Patents (LTE 표준특허의 정량적 분석)

  • Lee, Kyoung-Shil;Song, Young-Keun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.721-732
    • /
    • 2012
  • Patent information, which is generated under a specific, objective rule for a prolonged period of time, has the properties of technology, right, and management. Because of these characteristics of patents, patent analysis is used to identify R&D capacities and performances, and management strategies of a given nation or enterprise. In this paper, we analyze LTE essential patents which are key IPRs for implementing standardized LTE technology and major weapons in a global patent war. Total of 2,307 LTE essential patents, published and registered applications from European Telecommunications Standards Institute(ETSI)'s online IPR database as of January 2011, are analyzed in quantitative methods. The analysis results present status and statistics of LTE essential patents by major countries, applicant companies and technical fields. And a comparative study is done using 4 patent indices limited to the LTE essential patents issued in the United States. It is expected that results herein are useful for not only figuring out the technological competitiveness of countries and companies in LTE market, but also suggesting a guide to strategic IPR management for related industries.

Trends Analysis of Open Access for Foreign and Domestic Scholarly Journals in the Field of Library and Information Science (국내외 문헌정보학 학술지의 오픈 액세스 동향 분석)

  • Yoon, Hee-Yoon;Kim, Sin-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.257-276
    • /
    • 2007
  • The major concern of scholarly communication system that consists of libraries, researchers, and publishers is scholarly journals. But there is a huge chasm between the groups that have their own respects and strategies, compensations, and rights about scholarly journals. This difference makes open access movement which has two strategies: Open Access Journal(OAJ) and Open Access Archives (OAA). This paper describes the current status and analyses serious limitations of OAJ and OAA, especially, including the present address in the field of library and information science.

  • PDF

Adaptive HMAC Algorithm Considering Traffic Variation in the WLAN Mesh Network (WLAN 메쉬 네트워크에서 트래픽 변화를 고려한 적응형 HMAC 알고리즘)

  • Kil-Jae Kim;Bum-Gon Choi;Min Young Chung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1228-1231
    • /
    • 2008
  • 유선 네트워크와는 달리 WLAN 메쉬 네트워크는 비용면이나, 이동성면에서 장점을 많이 가지고 있다. 이에 대한 표준화가 진행 중에 있지만 많은 문제점과 기술적으로 해결해야 할 부분들이 남아있다. 특히 무선 전송기술인 DCF는 WLAN 메쉬 네트워크에 직접적으로 적용시키기에는 많은 문제점을 가지고 있다. DCF를 사용할 경우에는 무선자원을 공유하는 노드의 수가 증가하고 보내려는 패킷이 증가할수록 프레임간 충돌횟수가 급격히 증가해 무선자원의 사용 효율이 현저히 떨어지기 때문이다. 반면 PCF는 노드에게 일정시간 채널을 점유할 권리를 부여함으로써 프레임간 충돌을 없애 무선자원의 사용 효율을 향상시킬 수 있다. 하지만 트래픽이 적은 경우에는 불필요한 조사 프레임 전송, 조사목록 갱신 등으로 무선자원을 낭비하는 단점이 있다. 따라서 이 두 기술의 장점을 이용하여 WLAN 메쉬 네트워크에 적용시킨다면 데이터 전송의 효율을 증대시킬 수 있다. WLAN 메쉬 네트워크의 기본 통신범위 내에는 많은 노드들이 있으며 이를 계층적으로 나눌 경우 계층에 따라 트래픽의 양에 많은 차이를 보인다. 따라서 본 논문에서는 WLAN 메쉬 네트워크에서 DCF와 PCF를 트래픽에 따라 유연하게 사용함으로써 전송 효율을 증대시키는 적응형 HMAC 알고리즘을 제안한다. 시뮬레이션 결과 WLAN 메쉬 네트워크가 DCF에 전적으로 의존하는 경우에 비하여 적응형 HMAC 알고리즘이 적용된 WLAN 메쉬 네트워크는 트래픽이 증가할수록 수율, 지연 등에서 더 좋은 성능을 나타내었다.

A Study on the System of Confidential Record Management of the USA (미국의 비밀기록관리제도에 관한 연구 -대통령의 행정명령(EO)을 중심으로-)

  • Kim, Geun Tae
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.159-206
    • /
    • 2019
  • This study aims to analyze the details of the executive order of the president of the United States, which have been developed in the country's administrative system to institutionalize the guarantee of the people's right to know the classified records, as well as to protecting national secrets. This study also aims to present any implications for the development of the classified record management system of Korea. To this end, the previously issued EO concerning the classified records management were reviewed in terms of its classification, safeguard, and declassification. The analysis results showed that the EO by the president established and prescribed the special access program for national secrets, the system to exempt and suspend the automatic declassification, and the sanctions for protecting national secrets. The EO also established and prescribed the appointment system for the person with the authority to classify record, automatic declassification program, and Mandatory declassification review system, as well as the procedures for historical researcher and certain former government personal to access the classified records with the purpose of guaranteeing people's right to know. As a result, this study identified implications for the development of Korea's classified record management system, as follows : First, it is necessary to restructure the current classified record management system, by changing the operations that is dependent on the director of the National Intelligence Service to the one that is dependent on the President. Second, it is necessary to legislate a separate special law for the classified record management system. Third, a standing supervisory body should be established for the integrated management and for the consistent and routine supervision of the classified record management. Fourth, it is necessary to establish procedures to further review the classification of classified record to correct the defects of the current classification system, which has been abused and mismanaged by the national agencies and organizations that produce classified record.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

What is Pivot? Implementation Strategies in NGOs under CBR (중심축은 무엇인가? 지역사회중심재활(CBR)을 중심으로 한 NGO 활동전략)

  • Shin, Sook Kyung
    • 재활복지
    • /
    • v.22 no.4
    • /
    • pp.23-41
    • /
    • 2018
  • Non-Government Organizations (NGOs) for rehabilitation of people with disabilities in India have been carrying out of an important strategy in the long-term protection of their rights. However, it is embarrassing to aware that many number of NGOs remain starved for resources under very unsatisfactory conditions. CBR programs could fill a vacuum and satisfies urgent needs and strategies of NGOs' activities. The purposes of this article are to present rehabilitation strategies toward social change and fulfillment of human rights by NGOs, have played a major role in disability and disability services in India, and to challenge CBR program as awareness raising and community developing. This would be accomplished by reviewing several articles conducted regarding ways that NGOs can become more effective source in long-term rehabilitation service with CBR program in India. Some suggestions are revealed.

A Study on The Parking Management System for Urban Residents in Designated Parking Space Environment (주차 지정된 공용 환경에서 도심 생활자의 주차 관리시스템 연구)

  • Kang-Hyun Nam
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.877-884
    • /
    • 2023
  • In this study, when another vehicle is parked in a designated space where a personal vehicle can park and a defined personal use time, an ultrasonic object recognition sensor is used to determine vehicle entry, and a camera sensor recognizes a license plate. If the vehicle is not recognized by the individual vehicle owner, the "private parking lot operation block" of the application server receives the individual phone number based on the National Police Agency's Vehicle Number Information Inquiry Open API. Afterwards, when parking is processed, the non-right holder receives the approval of the parking right holder, parks for the recognized time, and deposits the parking fee into the public account of the city hall. Through this study, it was possible to find an operation processing method that can most effectively manage parking in the city center in a private parking space recognized by the city hall.

Digital Color Image Watermarking for JPEG2000 (JPEG2000을 위한 디지털 칼라 영상 워터마킹)

  • Park Jong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1755-1759
    • /
    • 2004
  • Digital watermarking technology is one of method of protecting property from the illegal reproduction of digital data. This technology inserts the specific data in a certain file to identify the property, that is an author and rights, not for human to be seen and heard. In this paper, the watermarking technology which inserts a RGB color watermark in a JPEG2000 color image using the visual characteristics of wavelet coefficient was proposed. After applying various attack at a watermarked image according to proposed technology, the likeness between the original image, the watermark and the extracted watermark was measured and investigated. As a result, the PSNR value of image was varied depending on perceptual parameter, but we can obtain 32dB as a whole.

A Study on Internet Knowledge Markets and Copyright Issues in Korea (인터넷 지식거래소와 저작권에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.1 s.63
    • /
    • pp.121-145
    • /
    • 2007
  • This study aims to identify copyright issues regarding the knowledge content currently circulated through knowledge exchange markets in the Republic of Korea. The content providers of knowledge exchange markets comprise government & public institutions, full-text database companies, publishers and individuals. It is worth noting that commercial trade of copyrighted content or material among academic journals, database companies and knowledge exchange markets essentially exclude individual authors who are the actual copyright holders. In principle, the original author owns the copyright whether it has an explicit notice or not. Unless the author/owner officially agrees to transfer the copyright including the right for so-called "derivative works", content-making based or derived from the copyrighted material, digitalization of the copyrighted work as well as its registration on full-text database and circulation through knowledge markets are illegal.