• Title/Summary/Keyword: Access Scope

Search Result 167, Processing Time 0.022 seconds

Shadow Libraries: A Bibliometric Analysis of Black Open Access Phenomenon (2011: 2023)

  • Safinaz Mahmoud Elroukh
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.21-32
    • /
    • 2024
  • This study analyzes the global literature on the black open-access phenomenon from 2011 to 2023. A bibliometric analysis was conducted using the Scopus database. The search strategy employed advanced queries with multiple synonymous terms to ensure exhaustive retrieval of relevant documents. The VOSviewer software was employed to visualize the co-occurrence networks. The findings reported 90 papers published during the study period. An evolving scholarly landscape was revealed, with heightened attention from 2016 onwards, peaking in 2017, 2021, and 2023. Articles constitute 83.3% of the total published documents. Singh and Srichandan are prolific authors, with 11.2% of the total publications. The United States contributes 18.9% of the papers, followed by India and Spain. Information Development and Scientometrics are pivotal journals in scholarly discussions about this scope, contributing 4.4% of publications. Co-occurrence network visualization revealed "Sci-Hub" and "open access" as the most used keywords in the global literature. The findings underscore the need for additional research to discover innovative business models to safeguard intellectual property rights while meeting researchers' evolving needs. The importance of this paper comes from being the first bibliometric study analyzing international literature related to this phenomenon, which provides a basis for future research efforts and policymaking.

A Study on the Development of Evaluation Indicator for Architectural Design Quality Inhancement -Based on the Public Building- (건축 디자인품질향상을 위한 평가지표 개발에 관한 연구 -공공건축물을 대상으로-)

  • Lee, Ji-Eun;Ryu, Soo-Hoon;Koh, In-Lyong
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.11 no.1
    • /
    • pp.15-22
    • /
    • 2011
  • The purpose of this study is to develop design quality indicator for improvement of public architecture in Korea. The spatial scope of the study which sees limited at 'domestic public buildings'. The study contents scope is to develop design quality indicator to use design phase and evaluation of 'public buildings'. For this design quality indicator, we have analysed various domestic and international institutions associated with architecture design. And, design indicator for the possibility of application in public buildings were extracted. Through this work design quality indicator specific and objective was drawn. The results of this study 8 category were drawn 'Public', 'Harmony', 'Impact', 'Access', 'Landscape', 'Use', 'Sustainable', 'Technology'. Also, 29 Design quality Indicator were suggested. Finally, this study was developed by utilizing Design Quality Indicator can be utilized in the design phase, the evaluation process should be developed.

Fashion Blogging and Personal Style Bloggers: The Evolving Enterprise

  • Reddy, Shweta Linga
    • International Journal of Costume and Fashion
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • This study examines existing literature and uses case studies to identify the scope of fashion blogging and the evolving role of the personal style bloggers in the fashion business. Information on six popular personal style bloggers has been gathered to demonstrate the evolving business of these bloggers and their scope of operations that are relevant to fashion. The case of these six bloggers were drawn from popular media publications such as CNN, Wall Street Journal (WSJ), Time, Women's Wear Daily (WWD) and The New York Times. The case study of these six bloggers reveals that these personal style bloggers have used their reach and influence on the blog audience to procure and access business opportunities to grow their enterprise. The findings indicate that affiliation, partnership or collaboration with brands or established designers adds more value to a personal style bloggers resume. However, the findings also indicate that the popular fashion bloggers provide a new opportunity for marketing and promoting fashion brands and products to the younger generation.

A Method for Specifying the Access Control of XML Document using Process Algebra (프로세스 대수를 이용한 XML 문서의 접근권한 표현법)

  • Lee, Ji-Yeon;Kim, Il-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.251-258
    • /
    • 2007
  • With the increase of a web service technology, a new access control mechanism has developed for XML documents. As a result, as legacy access control systems, access control systems has become an active research topic. In this paper, we propose a methodology to translate access control policies for XML documents into formal specification language CSP. To do this, first, we introduce a method to translate a hierarchical access to XML documents using XPath language into CSP process algebra. Second, we explain a method to represent a XML schema as a formal model like automata. Third, we present a method for representing the semantics of access control policies such as the scope of rules and confliction resolution into a process algebra language. Finally, a CSP specification example of an XML schema and path expressions aye shown to illustrate the validity of our approach.

  • PDF

Improvement of Reliability in V5.2 Link Identification Procedure (V5.2 링크 식별 절차의 신뢰성 향상 방안)

  • 이충돈;김영화방효찬최승욱
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.249-252
    • /
    • 1998
  • ETSI(European Telecommunications Standards Institute) 300 34701, ITU-T(International Telecommunication Union) G.965 recommended PSTN, CONTROL, LINK CONTROL, BCC, PROTECTION protocols on V-Interfaces. But it is possible to occur misalignment between LE(Local Exchange) and AN(Access Network), especially in link identification procedure because there isn't any comment about V5.2 system management. In this paper we propose S/W guard timer to improve reliability in V5.2 link identification procedure in scope of Recommendation.

  • PDF

Institutional Constraints to Innovation: Artisan Clusters in Rural India

  • Das, Keshab
    • Asian Journal of Innovation and Policy
    • /
    • v.4 no.2
    • /
    • pp.132-153
    • /
    • 2015
  • Rural enterprise clusters in India have often been characterized by low-end products, poor income earning options and a near-absence of innovativeness. This has implied limited market access, inadequate organization of production and distancing from sources of formal knowledge. Policy neglect of rural industrialization notwithstanding this paper explores the nature of institutional constraints to innovation through intensive case studies of five rural artisan clusters (handlooms and handicrafts) in as many Indian states. Whether it relates to access to loan finance or technology support or linking to markets, the formal institutions (public or private) have been distanced by informality that typifies most rural enterprise clusters. An obsession with a sectoral approach to cluster development has negated addressing infirmities of the space of enterprise, even as scope for learning from some Asian economies in rural enterprise promotion exists. The paper also enquires if the innovation systems have been inclusive and pro-poor.

Perspective Framework on the Fourth-Generation Mobile Communication Systems

  • Kim, Jin-Young;Kim, Duk-Kyung;Park, Seong-Soo;Lee, Goon-Seop;Ryu, Si-Hoon;Chang, Myung-Rae;Koo, Jun-Mo
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.321-335
    • /
    • 2002
  • Emergence of the fourth generation mobile communication system (4G system) is now in its dawn. This article proposes a perspective framework on the 4G system, and discusses various kinds of system aspects and technological requirements in terms of novel service features, spectrum management, radio access technologies, wired access integration, core network, and mobile terminal. The focus of the article is to define the scope and features of the 4G system in an overall system/network viewpoint. From the foreseeable development trends, it is highly expected that whatever emerges in the 4G system will be some kind of constantly evolving and grand recursive concatenation of all the existing system/network developments.

Augmented Reality Framework for Efficient Access to Schedule Information on Construction Sites (증강현실 기술을 통한 건설 현장에서의 공정 정보 활용도 제고 방안)

  • Lee, Yong-Ju;Kim, Jin-Young;Pham, Hung;Park, Man-Woo
    • Journal of KIBIM
    • /
    • v.10 no.4
    • /
    • pp.60-69
    • /
    • 2020
  • Allowing on-site workers to access information of the construction process can enable task control, data integration, material and resource control. However, in the current practice of the construction industry, the existing methods and scope is quite limited, leading to inefficient management during the construction process. In this research, by adopting cutting edge technologies such as Augmented Reality(AR), digital twins, deep learning and computer vision with wearable AR devices, the authors proposed an AR visualization framework made of virtual components to help on-site workers to obtain information of the construction process with ease of use. Also, this paper investigates wearable AR devices and object detection algorithms, which are critical factors in the proposed framework, to test their suitability.

A Study on the Electronic Records Management for Enhancing Public Access (공개활성화를 위한 전자기록물 관리정책 연구)

  • 설문원
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.12 no.1
    • /
    • pp.65-86
    • /
    • 2001
  • This study aims to analyze the current policies and problems associated with the electronic records disclosure and to suggest the access paradigm for electronic records management. For this, Act on Disclosure of Information by Public Agencies. Public Records Management Act, and Electronic Government Act are analyzed in the light of public access to electronic records. The analysis lays special emphasis on the scope of public records to be disclosed, time to disclosure of public records. computer editing for pubic service. records dissemination through Internet, and the role of records centers and public libraries. Based upon the analysis, policy directions for electronic records management are suggested.

  • PDF

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.