• Title/Summary/Keyword: 인터넷 규제

Search Result 220, Processing Time 0.025 seconds

Market Definition and System Analysis of Paid Broadcasting Services (유료방송서비스의 시장 획정과 제도 분석)

  • Lee, Suil
    • KDI Journal of Economic Policy
    • /
    • v.32 no.3
    • /
    • pp.101-137
    • /
    • 2010
  • This paper defines markets relating to each paid broadcasting service by applying the test method of critical sales loss to the results of survey to the paid service subscribers. The result confirms the existence of a meaningful competitive relationship--in terms of the Competition Law--among all paid broadcasting services included in this study, or at least analog cable broadcasting, digital cable broadcasting, and real time IPTV(Internet Protocol TV) service. This indicates that current regulations which are being applied to cable TV, satellite broadcasting, and IPTV are actually discriminatory. Based on these analysis results, this paper suggests that the main attention for the improvement of regulations should be focused on regulations which are differently applied to different paid service providers. In particular, Article 20 in the Internet Multimedia Broadcasting Law is interpreted as defining the real-time IPTV as an independent market, thereby having leeway to harm fair competition among different paid service providers. Therefore, that article needs to change to give the right of equal access to contents to all the competing paid service providers. Furthermore, to put teeth in the contents equal access rule, most popular pay channels need to be designated as target contents of the rule. As for the market-share limitation regulations, the paper suggests that an upper limit on the market share should be set based on the total number of subscribers of all the competing paid services and the same limit applied to all the competing paid service providers.

  • PDF

A Comparative Study on the Regulation System of Public Sphere in the Social Media Space During the Election Campaign (소셜 미디어 관련 온라인 선거 공론장 규제체계 비교연구)

  • Lee, Dong-Hoon;Ryu, Jung-Ho;Jung, Soo-Young
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.74-99
    • /
    • 2011
  • This article tries to find out some regulatory facts to improve and vitalize roles of social media such as facebook, twitter, etc in the election campaign. For this goal, a theoretical approach is based on the agnostic and open aspects of the regulation system of election. Case study and in-depth interview were used as research methods in this article. The results are as follows. First, some differences are in the election regulatory system regarding the roles of social media in UK, US, Japan and Korea. The election public sphere systems of these countries categorized to the types of legal factors to control political communications in election public sphere; free-speech oriented system(UK. US), limited free-speech oriented system(Korea), normative-oriented system(Japan). Second, most respondents answered they agreed with some improvement ideas to reflect needs of netizen and academic who suggest to minimize regulatory burdens on social media in the political communication during the election campaign.

  • PDF

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.

A Study on the Promotion of Global Competitiveness of Korean Game Industry through Activation of Arcade Game business (아케이드 게임비즈니스의 활성화를 통한 한국 게임산업의 글로벌 경쟁력 증진 방안에 관한 연구)

  • Kim, Young-Wook;Jang, Young-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.289-295
    • /
    • 2013
  • Arcade game up until early 2000 had been highly influential and profitable industry that occupied most of the market share for the Korean domestic game industry. However, extensive and yet tightened restrictions were imposed to the industry in 2006 due to the problems of speculative games such as winning rate manipulation, serious addictiveness, and etc. This resulted in damaging healthy arcade game business and eventually caused it seemingly impossible to comeback up until now. This study is to address the current arcade game industry in Korea along with the best practices in other countries to come up with propositions for the comeback of domestic arcade game industry and improvement of competitiveness. Ultimately it is to develop diversification and flexibility and to induce new business opportunities in the domestic arcade game industry by proposing the ways to convert the bad perception and introduction of functional games.

A Study for Protocol for Heterogeneous Interface in Sensor Networks within Water Restore Facilities (수질복원시설물 내 센서 네트워크 이기종간 인터페이스용 프로토콜에 관한 연구)

  • Kim, Chan;Shin, Jaekwon;Cha, Jaesang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.255-260
    • /
    • 2012
  • Currently, the management system of wastewater treatment facility has magnified due to the stringent regulations for the protection of the environment. However, wastewater treatment system is insufficient in wastewater quality monitoring technology in specialized. Above all it aim one-to-one data transmission instead of one-to-n data transmission through sensor and network. And then, it lack compatibility toward communication system between different. Mainly it has observed detecting system of manual system. In this paper, we studied protocol technology about efficient data transmission between sensor and integration interface of water quality detecting interface for automated sensor network integration interface in water restoration facility. Therefore, we proved the possibility of efficient data transmission from communication system of different type through monitoring implementation of sensor network integration interface.

A Study on Software Development and Legal Regulation (소프트웨어 개발과 법적규제)

  • Kim, Hyung-Man
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.11-20
    • /
    • 2011
  • Internet users and copyright holder have been at the center of a severe legal dispute because file-sharing soft (P2P) through Napster aggravates the violation of copyright as well as takes on the world. Though it is natural that we should hold users a criminal penalty for the illegal use of various computer programs, I think that if the supply of a computer program is generally within a circle of development act, program developer ought not to hold users criminally liable for the unintended illegal act of users. Two main issues are addressed in this work: (i) the basis and validity of legal responsibility and condemnation that appear in the precedent set as to P2P in America, Japan, and Korea. (ii) the necessity of both scientific technology development and efficient legal regulation of copyright holder. For this purpose, software development and legal regulation are reviewed analyzed from viewpoint of the criminal law.

Cluster-head Decision Method for Cognitive Radio Based on Wireless Ad-hoc Network (인지 무선 기반 애드 혹 네트워크에서의 클러스터 헤드 선정기법)

  • Lee, Kyung-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.91-96
    • /
    • 2012
  • Ad-hoc networks can be used various environment, which it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio (CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In CR based wireless ad-hoc networks, cluster-head decides the existence of primary user using sensing information of primary user from each ad-hoc device. However, it is still defective research to decide cluster head among the a lot of ad-hoc devices. So, in this paper, we show the decision method of cluster head in CR based wireless and detection probabilities of primary user based on decision method of cluster head.

The Study of Online Piracy Protection -Focusing on Punishment and Moral Obligation- (인터넷 저작권 침해 보호에 관한 연구 -저작권 침해에 대한 처벌 및 윤리의식을 중심으로-)

  • Park, Joo Yeon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.145-151
    • /
    • 2013
  • As the Internet is widely used worldwide, digital asset on the internet becomes to be critical to protect from illegal copying and piracy which is an unlawful action that download or upload copyrighted materials from the Internet without having a right to use them from the copyright owners. Such an illegal and unethical behavior are pervading and becoming a big concern in many industries and business sectors over the world. This study examines the effect of the user's perception for piracy regulation and moral obligation on online piracy intention. Therefore, the purpose of this study is to see the different effect of regulation and moral obligation on piracy attitude and intention so as to suggest an effective method of piracy protection and to bring an attention on moral and ethical education for online piracy. The result of this study showed both punishment and moral obligation toward online piracy are significantly associated with users' attitude on piracy, indicating that higher level of punishment severity as well as moral obligation lead to decrease piracy attitude. This research also revealed that the level of users' moral obligation has a stronger relationship with piracy attitude than punishment.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

Correlation Analysis between COVID-19 and Plastic Emissions: Upcycle (코로나19와 플라스틱 배출량과의 상관관계 분석: 업사이클)

  • Lee, Ji-Hyeon;Hwang, Seung-Yeon;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.165-170
    • /
    • 2022
  • The amount of data generated by recent developments in Big data and related technologies has been rapidly increasing, and the need to predict changes in future societies and present technologies to be realized has been continuously raised to lay the foundation for national scientific and technological planning. The existing methods of predicting future technologies have their respective advantages, but problems also exist. Thus, this paper newly establishes and applies the methodology to be used for predicting future technologies specialized in information security fields beyond the existing comprehensive prediction, and draws out innovative technologies that are expected to have high ripple effects in the future, and analyzes the technological diffusion points of each technology to predict future technological changes in the information security sector. It is expected that this will ensure reliability and objectivity of the forecast survey results and allow more sophisticated and multilayered predictions than the overall scientific and technological forecast surveys.