• Title/Summary/Keyword: 권리정보

Search Result 487, Processing Time 0.025 seconds

A Standardizing research of Internet adverse effects catalog from Societal phenomenological pointview (사회현상학 관점에서의 인터넷역기능 분류체계 표준화 연구)

  • Kwon, Jung-In;Lee, Seong-Chul;Ahn, Seong-Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2011
  • Since IT technology grow rapidly, our ethic of consciousness has become big issue with adverse effect. Many scholar has discussed and tired to solve this problem, but it is still helpless to fix. Therefor in this paper, author will not suggest the solution, but will present model list of adverse effects and cases to prevent accidents. The model list of adverse effects, what author will present is about media addiction, harmful content, cyber-violence, right infringement, cyber terror and decision obstacle. This model list is made by primary and secondary survey. This model will show adverse effect of present day, but also will show future adverse effects that can be prevent. Through out this paper, this model list could use for education plan.

  • PDF

A Study on the Legal Protection of Science and Technology Databases on the Copyright Law and Online Digital Contents Industry Development Law (저작권법과 온라인 디지털 콘텐츠 산업발전법에 의한 과학기술 데이터베이스 법적보호에 관한 연구)

  • Jang, Tae-Jong;Yoo, Jae-Young;Jeong, Eui-Seob
    • Journal of Information Management
    • /
    • v.36 no.2
    • /
    • pp.153-172
    • /
    • 2005
  • Currently the copyright law and the online digital contents industry development law aim to protect the producers of databases and digital contents. A report on databases in the United States describes that an additional protection of databases is needed as databases get more significant in terms of science and economy and become a key factor on Internet. At this moment, Korea does not recognize the importance of databases of science and technology when we look into any public or civil organizations. Accordingly this paper deals in depth with overall issues surrounding the regal protection of science and technology databases, key contents for science and technology databases protection by current laws, and additional protection problems. Considering that the industry of science and technology databases plays a pivotal role in the securement of national competitiveness, the preparation of legal measures to properly protect databases as one of the policies for the continuing development of databases should not be overlooked.

A Study on Derivation of Technical Elements for Joint Use of Copyright Rights Group Data by ISNI Korea Consortium (ISNI Korea 컨소시엄의 저작권 권리 단체 데이터 공동 활용을 위한 기술요소 도출 연구)

  • Park, Jin Ho;Kwak, Seung Jin;Lee, Seungmin;Oh, Sang Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.1
    • /
    • pp.379-392
    • /
    • 2020
  • The purpose of this study is to present technical elements to improve the data utilization of the ISNI Korea Consortium, which is operated by the National Library of Korea, which is responsible for the registration of Korean names. The ISNI Korea Consortium aims to register various creation-related information in addition to bibliographic-related individual and organization name information. To this end, this study examines the ISNI Korea consortium, which is a data provider's consultative body, among other things, the metadata status of copyright organizations and the linked data specification of ISNI. As a result, data acquisition, refining, storage, identifier management, consortium metadata management, five in total, and RDF data management (repository) in terms of linked data, RDF data issuance, RDF data retrieval, RDF data inquiry, RDF data Eight technical elements, including download, ontology inquiry, standard term inquiry and mapping information management, were derived.

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

A Study on Confidential Records Management System in Japan (일본의 비밀기록관리 체제에 대한 연구 특정비밀보호법 제정·시행을 둘러싼 논의를 중심으로)

  • Nam, Kyeong-ho
    • The Korean Journal of Archival Studies
    • /
    • no.56
    • /
    • pp.113-145
    • /
    • 2018
  • Japan has enacted the Public Records and Archives Management Law from 2011 in order to prevent mismanagement of records management and to fulfill accountability to the public. However, in 2013, The Designated Secrets Protection Act was enacted before the Public Records and Archives Management Law brought changes to administrative institutions. The Designated Secrets Protection Act have raised concerns that the public's right to know and the transparency of administration are being retreated, especially the development of freedom of information and records management systems. This article analyzed the background of the establishment of Designated Secrets Protection Act and the contents of legal composition. It also identified the possibility of human rights abuse in the aptitude assessment system, the lack of independent monitoring agencies, the impossibility of internal accusations, and the possibility of wide confidentiality designation. Furthermore, analyzed how the problem affects Japanese records management and freedom of information system. Through this, I suggested the improvement of the system of the secret level records management system in Korea, the establishment of the clear purpose of the secret record management, the application of the Tshwane principle, and the establishment of the independent and professional monitoring agency.

Strategy for Establishing a Rights Processing Platform to Enhance the Utilization of Open Data (공공데이터 활용성 제고를 위한 권리처리 플랫폼 구축 전략)

  • Sim, Junbo;Kwon, Hun-yeong
    • Journal of Information Technology Services
    • /
    • v.21 no.3
    • /
    • pp.27-42
    • /
    • 2022
  • Open Data is an essential resource for the data industry. 'Act On Promotion Of The Provision And Use Of Public Data', enacted on July 30, 2013, mandates public institutions to manage the quality of Open Data and provide it to the public. Via such a legislation, the legal basis for the public to Open Data is prepared. Furthermore, public institutions are prohibited from developing and providing open data services that are duplicated or similar to those of the private sector, and private start-ups using open data are supported. However, as the demand for Open Data gradually increases, the cases of refusal to provide or interruption of Open Data held by public institutions are also increasing. Accordingly, the 'Open Data Mediation Committee' is established and operated so that the right to use data can be rescued through a simple dispute mediation procedure rather than complicated administrative litigation. The main issues dealt with in dispute settlement so far are usually the rights of third parties, such as open data including personal information, private information such as trade secrets, and copyrights. Plus, non-open data cannot be provided without the consent of the information subject. Rather than processing non-open data into open data through de-identification processing, positive results can be expected if consent is provided through active rights processing of the personal information subject. Not only can the Public Mydata Service be used by the information subject, but Open Data applicants will also be able to secure higher quality Open Data, which will have a positive impact on fostering the private data industry. This study derives a plan to establish a rights processing platform to enhance the usability of Open Data, including private information such as personal information, trade secrets, and copyright, which have become an issue when providing Open Data since 2014. With that, the proposals in this study are expected to serve as a stepping stone to revitalize private start-ups through the use of wide Open Data and improve public convenience through Public MyData services of information subjects.

A Plan to Provide Effective Risk Map Information by Linking a 3D Disaster Information Display System with an On-site Assistance Application (3D 재해 정보 표출시스템과 현장 지원 APP간의 연계를 통한 효과적인 Risk Map 정보제공 방안)

  • KIM, Do-Ryeong;GANG, Su-Myung;RYU, Dong-Ha;PARK, Ju-Sung;JO, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.1
    • /
    • pp.141-153
    • /
    • 2016
  • The increase in frequency and scale of natural disasters is the typical negative examples of the global climate change and the change of the human living environment in cities. The damage caused by natural disasters in particular including human and physical damage is directly linked to the safety and properties of citizens. Besides, the damage may occur to SOC facilities directly or indirectly. The SOC facilities damaged by disasters cause infringement of citizens safety rights. Therefore, a plan to provide prompt and effective risk map information by linking a 3D disaster information display system, which handles the information of the damage that may occur to SOC facilities such as bridges, beams, and dams at the time of disasters, with an on-site assistance application is suggested in this study. The prompt provision of risk map information is defined as a dynamic expression technology in this study. Also, disaster information is processed and compressed with a module developed to be linked organically to a system that displays disaster information, a proliferation system that can use the information on site, and a DB system that constructs a relationship with the information. Based on the module, the effective disaster information compression plan will be prepared, and the prompt information transmission system will be secured in the future.

Modeling 3D Cadaster for DBMS : focusing on Sectional Superficies (DBMS를 위한 3차원 지적 모델링 : 구분지상권을 중심으로)

  • Jun, Chul Min
    • Spatial Information Research
    • /
    • v.21 no.2
    • /
    • pp.73-83
    • /
    • 2013
  • 3D cadaster problems are getting attention and studied increasingly. However, correct concepts have not been established for three dimensional land uses and different rights problems around them. This is primarily due to the lack of proper methods for implementation and operation of 3D cadaster. 3D cadaster requiring far more huge data than 2D should be built in DBMS and need appropriate methods and processes for this. This study propose a method to model 3D cadaster using DBMS. First, it analyse and visualize possible problems around divided superficies in 3D spaces. Based on this, it illustrates UML models and shows an O-R mapping process to implement them using a RDBMS.

Development of a Copyright Protection System for Computer Forensics (컴퓨터 포렌식을 위한 디지털 저작권 보호시스템 개발)

  • Lee, Wol-Young;Hwang, Chul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.365-372
    • /
    • 2007
  • The information of world is most likely to be created as digital data. These digital productions need some legal protection mechanisms or techniques because users can illegally use them. Thus many researchers are developing various techniques. Currently most techniques are focusing on the physical and chemical methods like disk inspection for taking legal evidence about production infringement. This paper has developed a computer forensics-based copyrights protection system capable of detecting and notifying disobedience facts when user uses illegally a production. Furthermore if the user infringes continually the production the system stores the infringement facts to take the legal evidence by mapping to law for intellectual property right. The technique can protect data from digital evidence manipulation or destruction.

  • PDF

피구금자에 대한 권리보호적 측면에서의 도서관봉사

  • 홍명자
    • Journal of Korean Library and Information Science Society
    • /
    • v.6
    • /
    • pp.187-211
    • /
    • 1979
  • Persons who are waiting for decision of the court concerning whether they are guilty or not after they are involved in the criminal case and detained in the special institution isolated from society, will desire to de found innocent and acquited or to be slightly punished. Inmates are the suspected persons and the accused persons who are detained in the correctional institution. They have the right to de assisted by lawyes in order to receive the favorable verdict in the court. However, the right of the poor and the ignorant, in reality, cannot be perfectly protected due to the imperfection and defect of the defense counsel system itself and its application. Therefore, as a means to guarantee the so-called access to the court, the fundamental constitutional right, the law libraries are established and the legal information services are provided to the inmates within the correctional institution in the advanced country such as the United States. In addition, the judicial precedent and the various kinds of professional organizations provide the managerial guide-lines for such libraries to enoughly collect materials and to provide the effective information services to the inmates. In order to furnish the management of the correctional institution of Korea with useful information, the legal information services, materials collected, and information service personnel of the law libraries within the correctional institution are minutely examined in this paper.

  • PDF