• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.022 seconds

Analysis of Evaluation Indicators for the Development of Evaluation Models of Foreign Academic Journals (대학도서관의 외국학술지 평가모형 개발을 위한 평가지표 분석)

  • 김신영;이창수
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.2
    • /
    • pp.45-67
    • /
    • 2004
  • The purposes of this study are to compare and analyze the evaluation indicators for selection of journal suggested by scholars and organizations and to prepare theoretical background for the ideal model to meet opposing paradigms of collection management in academic libraries. A web survey method was employed to investigate applications of various selection criteria (27 for printed and 37 for electronic academic Journal) from the top 40 academic libraries in Korea. In addition, data were analysed statistically using factor analysis, t-test, Analysis of Variance(ANOVA), and Spearman's Rank Oder Correlation. The mean ranking for 9 evaluation indicators for printed were as follows: subscribing volumes per departments, degree of use, selection authority, electronic/print bundle, ISI impact factor, Internationality and reputation, costs for subscription, ILL & DDS, space considerations for printed materials. But, 11 evaluation indicators for electronic were as follows : costs for subscription, accessibility, electronic/print bundle, consortia, selection authority, access expandability, subscribing volumes per departments, scholarly features of the university, ISI impact factor, ILL & DDS, internationality and reputations.

A Study on the Direction for the Revision of Korean Cataloguing Rules (한국목록규칙의 개정 방향에 대한 연구)

  • Kim, Jeong-Hyen
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.4
    • /
    • pp.123-143
    • /
    • 2013
  • This study is to suggest the direction for KCR4's revision based on analysis of trends in cataloguing rules at home and abroad, characteristics of KCR4, and professional cataloguer's survey about revision of KCR4. Results of the study is summarized as follows. First, after Paris principles, the international attention to cataloguing rules is recently centered on ICP and RDA based on FRBR. Second, most cataloguing librarians feel confused over because KCR4 after 2003 is an unfinished rules without provisions on the authority control and heading's selection and form. So they want to revise KCR4. Third, the results of the professional cataloguer's survey showed mostly that KCR4 should be revised adopting international cataloguing rules like RDA and including contents of access points, detailed rules of the authority control, and the description in elements instead of resource's type.

Efficient Authentication for Mobile Nodes in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 이동 노드에 대한 효율적인 인증 메커니즘)

  • Lee Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.27-34
    • /
    • 2005
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In this paper, we address the problem of efficient authentication of distributed mobile users in geographically large networks. In particular, we propose a new authentication scheme for this case of MANETs. The proposed scheme exploits Randomized Groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority (CA). We then evaluate the performance of authentication using Randomized Groups.

A Study on Using the Role Indicators to Improve the Description Methods of the Statement of Responsibility (책임표시의 기술방식 개선을 위한 역할어의 활용 방안 연구)

  • Park, Zi-Young
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.3
    • /
    • pp.65-82
    • /
    • 2011
  • Statement of responsibility in bibliographical records plays a key role in clarifying intellectual responsibility of the work, and it also plays a role in making up access points. However, cataloging rules for the statement of responsibility mostly deal with the distinction between the principal role and minor roles. This becomes a problem because the responsibility type itself is more important than the order of the types. For this reason, in this paper I will explore improvements of the description methods of statement of responsibility by organizing the role indicators. Namely, using the role indicators more effectively than the current description methods do, we can collocate the dispersed statements of responsibilities. The role indicators can also be used for an author facet in information retrieval and can provide additional information for authority control.

A Study for RDA Implementation Scenarios and Future Bibliographic Control (RDA 구현 시나리오와 서지 제어의 장래에 대한 고찰)

  • Cho, Jane
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.3
    • /
    • pp.85-105
    • /
    • 2009
  • Disagreements between the technical environment and the conventional library catalog have caused a re-clarification of International Cataloguing Principles (ICP). Review is under way to finalize the publication of RDA (Resource Description and Access) in late 2009 by the Joint Steering Committee for Development of RDA. The impending RDA is based on FRBR (Functional Requirements for Bibliographic Records) which re-explains the bibliographic universe focused on entities, attributes and relationships between resources, but tries to maintain MARC as an encoding format for RDA. In this study, firstly FRBR, ICP and RDA were analyzed. Secondly, we propose 3 scenarios of RDA implementation: the future cataloging system based on the FRBR Entity, using a semantic web structure, and the scenario using the existing MARC format with some small changes. Finally, by examining response patterns of overseas bibliographic institutions, we present a set of urgent issues for future directions of bibliographic contro in Korea which includes, but not limited to, relationship between RDA/FRBR and KCR (Korean Cataloging Rules), continuation of KORMARC and authority control.

A Study on Marine Application of Wireless Access in Vehicular Environment (WAVE) Communication Technology (차량용 무선통신기술(WAVE)의 해상적용에 관한 연구)

  • Kang, Won-Sik;Jeon, Soon-Bae;Kim, Young-Du
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.4
    • /
    • pp.445-450
    • /
    • 2018
  • AIS is the most important navigation equipment for the identification of other ships, etc. However, the AIS overload problem has been raised recently due to an increase in AIS equipped vessels. The government is planning to introduce the wireless LTE network at 100 km offshore as part of the SMART-Navigation project. Continuous development and dissemination of the services available through such platforms will be necessary to achieve major goals such as marine accident prevention and environmental protection. In this study, we applied a WAVE communication system, which could be the basis for the development of such services. As a result, reliable data transmission was confirmed for a range of communication of approx. 5 miles, although the service was limited to 1 km in road traffic. Therefore, it is expected that WAVE communication technology will be used to prevent marine accidents through such efforts as collision avoidance and the transfer of marine safety information between ships.

A Study on the Present State of Construction Records Management System through the KS X ISO 15489 : Focused on K Puplic Corporation (KS X ISO 15489를 통해본 건설기록물 관리 현황 - K공단을 중심으로 -)

  • Lee, Hun-Ah
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.7 no.2
    • /
    • pp.113-138
    • /
    • 2007
  • This study was started from a critical mind for the construction records management in South Korea and examined the state of the construction records management system of the Korea Rail Network Authority which is constructing the biggest Express Railway Construction of National Project in Korea. The Methodology of this study is based on the functional requirement of the Records Management International Standard, ISO 15489, which standardized the record management process in the cases of Record Capture, Declaration, Classification, Storage, Access, Tracking and Disposition. In regard to the functional requirements from Capture to Disposition, each level(title) consists of 3 to 4 items, for a total of 22 principles in all. The estimation was created for each of the 22 categories using 4 levels: observance, partial observance, insufficiency and non observance. And pointing out the problem, suggesting the improvements for the Korea Rail Network Authority and structural improvements according to the KS X ISO 15489 principles.

A Study on the Plane Spatial Characteristics of Modern Samurai Houses in Izumi Fumoto Village, Kagoshima, Japan (일본 가고시마 이즈미 후모토 마을의 근세 무사주택의 평면공간특성에 관한 연구)

  • Kim, Yun-Sang
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.5
    • /
    • pp.29-38
    • /
    • 2018
  • This study aims to analyze the spatial characteristics of a group of samurai residences among other traditional Japanese villages and to accumulate the village-level sample data of a residential group, which can serve as the foundation for a wide range of discussions. Using data that had been gathered since 1989, this study draw up a prototype floor plans to analyze the indoor spatial features of the residences in the modern period, and sampled 35 samurai houses. The following are the results of this study. The general characteristics of traditional Japanese houses were found among many Izumi Fumoto samurai residences up until the early Meiji period. However, after gradually the floor plan became more and more simplified; connections between rooms were reduced, decreasing their flexibility; and there was a rise in the number of houses with a larger area devoted to the Nando, a room for women and family members. The access of a visitor involved changes in one's eye-level view and established physical and psychological boundaries, which this study conjectures was used as a method to ensure that the visitor recognized the authority of the patriarch and to raise the family's reputation. As their floor plan was simplified, Izumi Fumoto samurai houses established one's eye view, boundaries, and procedures as a way to enhance the authority of the man of the family and the family's reputation. In addition, while there was an increasing number of residences that expanded the area of the Nando, in which family members slept and used the space in a stable way, they maintained the exclusivity of private space and did not clearly show who would use it.

A Study on the National Cryptographic Policy : About the Right to Access the Cryptographic (국가 암호정책에 대한 연구 : 암호접근권한을 중심으로)

  • Kim, Dong-hoon;Kwon, Hun-yeong;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.99-109
    • /
    • 2021
  • With the recent development of ICT, information exchange through data communication network is increasing. Cryptography is widely used as the base technology to protect it. The initial cryptography technology was developed for military use and authorized only by the nation in the past. However, nowadays, much of the authority was unwillingly transferred to the private due to the pervasive use of ICT. As a result, there have been conflicts between the private demand to use cryptography and the nation's authority. In this paper, we survey the conflicts between nations and the private in the process of formulating the cryptography policy. Morever, we investigate the reality of the cryptography policy in Korea. Our investigations are expected to help the government apply cryptographic control policy in a balanced manner and plan development of cryptography industries. Lastly, we propose a need to establish a cryptanalysis organization and to legislate a legal sanction against fraudulent use of cryptography.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.