• Title/Summary/Keyword: 정보의 보호와 공유

Search Result 613, Processing Time 0.02 seconds

A Study on the Effective Countermeasure of SPAM : Focused on Policy Suggestion (불법스팸 방지를 위한 개선방안 : 정책적 제안을 중심으로)

  • Sohn, Jong-Mo;Lim, Hyo-Chang
    • Journal of Industrial Convergence
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2021
  • Today, people share information and communicate with others using various information and communication media such as e-mail, smartphones, SNS, etc. However, it is being used in malicious attacks to send a large amount of illegal spam or to use it for fraud by using illegally collected personal information and devices that are vulnerable to security. Illegal spam, smishing, and fraudulent mail(SCAM) cause a lot of direct and indirect damage to companies and users, including not only social costs such as mental fatigue, but also unnecessary consumption of IT infrastructure resources and economic losses. Although there are regulations related to spam, violators of the law are still on the rise by circumventing the law, and victims are constantly occurring, so it is necessary to review what the problem is. This study examined domestic and foreign spam-related regulations and spam-related response activities, identified problems, and suggested improvement countermeasures. Through this study, it was intended to suggest directions for improving spam-related systems in order to block illegal spam and prevent fraudulent damage.

Vector Map Data Watermarking Method using Binary Notation

  • Kim, Jung-Yeop;Park, Soo-Hong
    • Spatial Information Research
    • /
    • v.15 no.4
    • /
    • pp.385-395
    • /
    • 2007
  • As the growth of performance of the computer and the development of the Internet are exponential, sharing and using the information illegally have also increased to the same proportion. In this paper, we proposed a novel method on the vector map data among digital contents. Vector map data are used for GIS, navigation and web-based services etc. We embedded watermark into the coordinate of the vector map data using bit operation and extracted the watermark. This method helps to protect the copyright of the vector map data. This watermarking method is a spatial domain method and it embeds the watermark within an allowable error. Our experiment shows that the watermark produced by this method is resistant to simplification and translation.

  • PDF

A Study of Automatically Authentication System for Virtual Resource Organization on Grid (그리드상의 가상 자원 조직에 대한 자동 인증 시스템 연구)

  • 최병선;이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.301-306
    • /
    • 2004
  • The Grid VO(Virtual Organization) is temporary VO where gather indivisual, authority, or system resource, differ from previous VO concept that controled by internal principal and policy set. It have many problems in case of indivisuals, authorities, or system resources that became member\ulcorner of some Grid VO at same time and combination followed changing condition of system resource for building Grid VO. This paper propose lightweighted Grid VO authentication system based on XML security to solve the authentication of the problems occuring in building Grid VO. In this paper, Grid VO authentication system is including Grid VO authentication module that is intermediate management system in PH to previous authentication service structure and provide effective authentication service to Grid VO.

  • PDF

합리적(合理的) 노사관계(勞使關係) 정립(定立)을 위한 제도개선방안(制度改善方案)

  • Lee, Jong-Hun
    • KDI Journal of Economic Policy
    • /
    • v.16 no.4
    • /
    • pp.141-167
    • /
    • 1994
  • 본 연구는 현행 우리나라 노사관계(勞使關係)의 특정을 분석한 후, 미(美) 일(日) 등 선진국가의 노사관계(勞使關係) 경험으로부터 시사점을 도출하여 경제적(經濟的) 합리성(合理性)에 기초한 합리적(合理的) 노사관계(勞使關係)를 정립하기 위한 기본방향(基本方向)과 제도개선방안(制度改善方案)을 제시하였다. 첫째, 파업비용(罷業費用)이 작아 노동조합의 힘이 과도하게 커졌던 교섭력(交涉力)의 부균형(不均衡) 구조(構造)를 개선해야 한다. 반면에 한계근로자(限界勤勞者)는 주로 근로기준법(勤勞基準法)에 의해 보호를 받고 있으므로 법정근로기준(法定勤勞基準)을 일률적(一律的)으로 하향조정(下向調整)하는 것은 바람직하지 않다. 둘째, '종업원만족(從業員滿足)을 통한 고객만족(顧客滿足)', '정보공유(情報共有)를 통한 파업예방(罷業豫防)'을 위해 노사협의회(勞使協議會)의 기능을 강화(强化)하여 근로자(勤勞者) 경영참여(經營參與)를 확대(擴大)해야 한다. 셋째 유연(柔軟)한 인력관리(人力管理)를 위해 고용관계(雇傭關係)의 경직성을 초래하는 법 제도를 개선해야 한다. 유연한 고용조정을 위한 정리해고규제(整理解雇規制) 완화(緩和), 다양한 근로관계의 형성에 유연하게 대응하기 위한 고용결약(雇傭契約)의 자유화(自由化) 확대(擴大)등이 이루어져야 할 것이다. 넷째, 노사분쟁(勞使紛爭)의 소지가 많아지고 파업(罷業)의 경제적(經濟的) 비용(費用)이 크게 증대될 것이므로 노사분쟁처리의 공정성(公正性)을 제고하기 위해 중재위원(仲裁委員) 선정방법(選定方法) 개선(改善) 등의 제도개선이 있어야 한다.

  • PDF

A Study on the Use and Protection of Copyrights in Public Archives (공공기록물의 이용과 저작권보호에 관한 연구)

  • Si, Kwi-Sun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.2
    • /
    • pp.159-188
    • /
    • 2009
  • In the midst of computerization and digitization of the archives, the way of use and the need of users to use the public archives has been changed and expanded. It draws concerned party's attention to the copyrights in the public archives and the protection of the copyrights of the public archives. This study examines the exiting copyright laws in Korea and some foreign countries, interprets the laws, and presents legal implications when the laws are applied to the public archives held in the National Archives of Korea(NAK). The public records are "literary works" and their copyrights are to be protected. Most of the public archives held in the NAK are also "creative works" which are the presentations of thoughts and feelings of the individuals, the records creators in the public agencies. The holder of the copyrights of the archives is not the NAK, but the agency which created the archives, such as the central government and local governments. To promote the use of public archives, we need to expand the public domain in the public records and archives and the fair use of the archives. To do this, I suggest to amend and complement the Copyrights Act, the Pubic Records/Archives Management Act, and the Opening Records in the Public Agencies Act(FOIA in Korea). The establishment of a coordinating body dealing the copyrights in pubic record and archives is strongly recommended. The coordinating body will provide guidelines on protecting copyrights and expand the fair use and the public domain of the public archives.

A framework of management for preventing illegal distribution of pdf bookscan file (PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크)

  • Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.897-907
    • /
    • 2013
  • Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.

A Preliminary Study on Domestic Embracement and Development Plan Regarding UNESCO World Heritage Programme (유네스코 세계유산 제도의 우리나라 문화재 정책에의 수용과 발전방안에 대한 시론적 연구)

  • Kang, Kyung Hwan;Kim, Chung Dong
    • Korean Journal of Heritage: History & Science
    • /
    • v.43 no.1
    • /
    • pp.56-85
    • /
    • 2010
  • UNESCO World Heritage Programme was introduced following the adoption of Convention Concerning the Protection of the World Cultural and Natural Heritage by the General Conference of UNESCO in 1972 in order to protect cultural and natural heritage with superb value for all mankind. Despite its short history of less than 40 years, it has been evaluated as one of the most successful of the cultural area projects of UNESCO with 890 world heritage registered worldwide. For systematic protection management of World Heritage, UNESCO, through systemization of registration, emphasis on the importance of preservation management plan, institutionalization of monitoring, and operation of World Heritage Fund, has utilized World Heritage Programme not just as a means of listing excellent cultural properties, but as a preservation planning tool, and accordingly, such policies have had a significant influence on the cultural heritage protection legislations of numerous nations. Korea has ratified World Heritage Convention in 1988, and with the registration of the Royal Tombs of the Joseon Dynasty in 2009, it has 9 World Heritage Sites. Twenty years have passed since Korea joined the World Heritage Programme. While World Heritage registration contributed to publicity of the uniqueness and excellence of Korean cultural properties and improvement of Korea's national culture status, it is now time to devise various legislative/systematic improvement means to reconsider the World Heritage registration strategy and establish a systematic preservation management system. While up until now, the Cultural Properties Protection Law has been amended to arrange for basic rules regarding registration and protection of World Heritage Sites, and some local governments have founded bodies exclusive for World Heritage Site management, a more fundamental and macroscopic plan for World Heritage policy improvement must be sought. Projects and programs in each area for reinforcement of World Heritage policy capacity such as: 1) Enactment of a special law for World Heritage Site preservation management; 2) enactment of ordinances for protection of World Heritage Sites per each local government; 3) reinforcement of policies and management functionality of Cultural Heritage Administration and local governments; 4) dramatic increase in the finances of World Heritage Site protection; 5) requirement to establish plan for World Heritage Site preservation protection; 6) increased support for utilization of World Heritage Sites; 7) substantiation and diversification of World Heritage registration; 8) sharing of information and experiences of World Heritage Sites management among local governments; 9) installation of World Heritage Sites integral archive; 10) revitalization of citizen cooperation and resident participation; 11) training specialized resources for World Heritage Sites protection; 12) revitalization of sustainable World Heritage Sites tourism, must be selected and promoted systematically. Regarding how World Heritage Programme should be domestically accepted and developed, the methods for systemization, scientific approach, and specialization of World Heritage policies were suggested per type. In the future, in-depth and specialized researches and studies should follow.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

A Study on Security Reference Model in Personal Health Lifelog Services (개인 건강 라이프로그 서비스에서 보안 참조 모델에 관한 연구)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.109-115
    • /
    • 2016
  • Life log started with the simple purpose of recording or sharing mainly data regarding one's personal life, but with the introduction of advanced specialized analytic methods by many corporations, a new type of business based on the life log recently emerged, with an aim of improving the quality of people's personal lives. In spite of the indispensable advantages, however, personal health lifelog service brings critical challenges that cannot be avoided from user side if the security of the data is concerned. The problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the revitalization of personal health lifelog services. In this paper, we propose an information security reference model for the personal health lifelog services. Our proposal can contribute to increase the related industry to cultivate new market by suggesting the clear announcement of the guidelines using privacy protection reference model for user-specific healthcare services which uses personal lifelog.

An Analysis on Teacher Librarians' Self-reported Appraisals about School Library-based Instruction (도서관 활용수업에 대한 사서교사의 자기평가 분석)

  • Song, Gi-Ho
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.5-23
    • /
    • 2016
  • The aim of this study is to analyze the effect and limitation of teacher librarians' self-reported appraisals and suggest it's activation plans about school library based instruction (SLBI). According to results of analyses, the SLBI begin with subject teachers' demand for learning materials and teacher librarians play their educational role in Information search & access and representation & synthesis of information during the instruction. Compared with previous studies, the limitations of SLBI we can see in this study are restricted role of teacher librarians, exclusive attitude and antipathy to classroom opening of subject teachers under the SLBI. The bars of promoting the SLBI are also the difficulty of collaborative working with several same subject teachers and subject classroom system. The ways of activating the SLBI suggested in their self-reported appraisals are building intimacy with subject teachers and participating actively curriculum council, peer-supervision and demonstration classes.