• Title/Summary/Keyword: 권리정보

Search Result 487, Processing Time 0.024 seconds

Current Issues with the Big Data Utilization from a Humanities Perspective (인문학적 관점으로 본 빅데이터 활용을 위한 당면 문제)

  • Park, Eun-ha;Jeon, Jin-woo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.125-134
    • /
    • 2022
  • This study aims to critically discuss the problems that need to be solved from a humanities perspective in order to utilize big data. It identifies and discusses three research problems that may arise from collecting, processing, and using big data. First, it looks at the fake information circulating with regard to problems with the data itself, specifically looking at article-type advertisements and fake news related to politics. Second, discrimination by the algorithm was cited as a problem with big data processing and its results. This discrimination was seen while searching for engineers on the portal site. Finally, problems related to the invasion of personal related information were seen in three categories: the right to privacy, the right to self-determination of information, and the right to be forgotten. This study is meaningful in that it points out the problems facing in the aspect of big data utilization from the humanities perspective in the era of big data and discusses possible problems in the collection, processing, and use of big data, respectively.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

A Study of Digital Library Service Records and User Privacy (디지털도서관서비스기록과 이용자프라이버시에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

A Study on the Extension of Cadastral Registration Objects - Focused on the Registration of Obligations and Restrictions - (지적공부 등록사항 확장 방향성에 관한 연구 - 의무 및 제한사항 등록을 중심으로 -)

  • Kim, Young-Hag;Park, Jong-Cheul;Oh, Bu-Hwan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.2
    • /
    • pp.15-26
    • /
    • 2015
  • Since the creation of modern cadastral system in 1910's the cadastral system has been modified to comply with a new technical development and diverse requirements. However, the discussion on the directions for extension of cadastral records has been rarely addressed. In this paper it is proposed that the direction of extension cadastral records from the current a right focused perspective to an obligation and restrictions perspective based on the FIG Commission 7's Cadastre 2014 which is a future vision of cadastral system development. As the extension directions, a legal and technical perspective and functional extension for a role for land information publicity platform has been presented. Considering the extension directions an environment and disaster management field has been reviewed for an applicable fields.

A New Model for Codes of Ethics for Librarians of South Korea (한국의 사서직 윤리규정 방향 제안)

  • Kim, Hae-Kyoung;Nam, Tae-Woo
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.329-352
    • /
    • 2004
  • In this knowledge-based society of this age, librarianship takes a professional position and requires essential principles of ethics that has to be observed. Therefore, library associations and professional communities all over the world have released criteria and code of ethics to make their professional positions to keep. This research investigated and analyzed the codes of ethics for librarians in United States, Great Britain, Japan, and South Korea which are based on the mission of each library of each country. Based on these analysis and comparison, this research proposed more advanced codes of ethics for South Korea. The proposed model of codes of ethics consists of two parts: ethics for information and ethics for professional positions. The ethics for information contains six essential elements: equal access and services for information, denial of inspection, protection of privacy, neutralization of librarian, and security of intellectual freedom. The ethics for professional positions consists of 8 essential aspects: exclusion of personal benefit, continuous efforts for developing knowledge, keep the professional position, conflicts between professional task and organization, relationship with co-workers, ensure the conditions of rights and welfare for employees, cooperations among libraries, and contribution for creation of new culture.

Development of Disaster Management Capacity Analysis Program for Local Government (지방자치단체 재난안전관리 자체 역량분석 프로그램 개발)

  • Yoo, Byungtae;Oh, Keumho
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.3
    • /
    • pp.266-275
    • /
    • 2013
  • New paradigm to the advancement of disaster management is required for building resilient and safe society. In these circumstances, the importance of local government disaster management capacity has been emphasized through experiencing a series of accidents including 2012 september Gumi fluorosilicic acid diffusion accident. The increase of people's disaster awareness has emerged the public demands on disaster management information of local area. In this study, the disaster management capacity analysis program is developed for self-assessment of local government. The program is designed for disaster managers to database the categorized index of disaster management capacity and recognize the capacity level. For the public announcement of disaster management capacity, the analysis results are shown for citizens in the understandable format. It is expected that the enhancement of emergency management capacity of local society can be achieved by the efforts of local government analyzing and improving the vulnerability as well as the participation of local society.

Asymmetric Temporal Privilege Management on Untrusted Storage Server (네트워크 스토리지에서 비대칭키 방식의 시 분할 권한 권리 (ATPM))

  • Kim, Euh-Mi;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.31-42
    • /
    • 2005
  • We consider a network storage model whose administrator can not be fully trusted. In this model, we assume that all data stored are encrypted for data confidentiality and one owner distributes the decryption key for each time period to users. In this paper, we propose three privilege management schemes. In the first scheme, called Temporal Privilege Management (TPM), we use a symmetric encryption based on one-way function chains for key encapsulation. In the second scheme, called Asymmetric Temporal Privilege Management (ATPM), anyone can encrypt the data using the public key of owner, but only privileged users can decrypt the encrypted data. Finally, we present a scheme to restrict writers' privilege using ID-based signatures in ATPM. In our schemes, the privilege managements are based on the time and the addition of users is efficient. Specially, applying TPM and ATPM, we can solve the back-issue problem.

Study on the Characteristic of Media Lawsuits by Public Figures and the Tendency of the Court Decisions in Korea: Focusing on the Decision about Defamation of Politicians and Senior Government Officials Since 1989 (공인의 미디어 소송 특징과 국내 판결 경향에 관한 연구: 1989년 이후 정치인 및 고위 공직자 명예훼손 판례를 중심으로)

  • Yun, Sung-Oak
    • Korean journal of communication and information
    • /
    • v.40
    • /
    • pp.150-191
    • /
    • 2007
  • Defamation lawsuits of public figures against media have been an issue since Roh government set in. Dissension between the government and media has probably acted as the key factor on this problem. Accordingly, arguments on the defamation lawsuits of public figures occurred the political issues such as opposition between the Progressive and the Conservative Parties or between the ins and the outs and showed the limits to suggest an appropriate judgment or solution. This study will analyze how the court makes its judgement on their rights and the limits by understanding the characteristic and the problem of defamation lawsuits made by senior government officials including a politician, the government, the president, and etc. As results, the defamation lawsuits of politicians and senior government officials showed specially noteworthy matters in salvation (damage suits), the amount claimed, court costs, ratio of winning lawsuits, and etc. The result on the tendency of the court decision showed the following matters in confusion: it holds the media responsible for the burden of proof by applying the inappropriate criterion; The applied laws, especially in the inferior court decision, do not show the consistency of the burden of proof between the misconception/ intention (malice)/ accident/ purpose of slander on the legal principles of public figures. Therefore, this study suggests the court to apply an appropriate law, let alone regulating the Anti-SLAPP law, so that it curtails the rights of public figures; limits the salvation of damage suit; and protects the right only in the case of false accusation by applying the existing law of "the Protection of the Deceased's Defamation Law." In order to dissolve the confusion when applying the laws on the public figures, the study insists the court to positively apply the Constitutional Court made criterion on "people" and "content." The study also insists to distinguish "intention(malice)," "accident," and "purpose of slander" and variant sorts of the burden of proof should be applied to each.

  • PDF

Analysis on the Impact of Knowledge of Personal Information Protection on Their Behaviors in Elementary School (초등학생의 개인정보보호에 관한 지식이 행동에 미치는 영향 분석)

  • Lee, Kyungchan;Kim, Jamee;Lee, Wongyu
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.3
    • /
    • pp.299-310
    • /
    • 2015
  • This study was conducted with the goal to identify the degree to which elementary school students' knowledge about personal information protection practices impacted their actual behavior with regard to privacy protection. To fulfill this goal, knowledge about personal information protection was set as (1) knowledge about concepts of personal information, (2) knowledge of the rights of information holders, (3) knowledge about the code of conduct for information protection, and (4) awareness of the value of personal information. As for students' behaviors to ensure their personal information protection those were set as their habits to comply with the personal in-formation protection code of conduct and their efforts to respond and recover from any personal information violation. This study was conducted targeting 510 elementary students. The degree of the students' knowledge and their behaviors was measured by first distributing a self-report survey to the students and then analyzing their responses. The results of the analysis revealed the following: First, it was found that there are no differences among the four factors of knowledge and behavior according to the status of their education. Second, the two factors that primarily affected their personal information protection behavior were found to be their awareness of the information protection code of conduct and awareness of the value of personal information. This study holds significance in that it makes suggestions as to how personal protection practices should be taught to public school students.

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.