• Title/Summary/Keyword: Data protection

Search Result 3,440, Processing Time 0.042 seconds

The Intertemporal Enforcement Strategies of Copyright Protection : An Analysis of Information Goods in the Presence of File-Sharing Networks

  • Kim, Jong-Woon
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.1-15
    • /
    • 2009
  • The paper analyzes a copyright owning firm's incentive to enforce its copyright in the presence of file-sharing networks. I devise a two-period model where a copyright owner sells two different versions of a creator's information good, and show that the firm's overall profits are enhanced by a strategy of differential inter-temporal enforcement of the copyright protection, compared to strategies of no enforcement or full enforcement in both periods. If the firm enforces no copyright protection in the first period, the low-valuation consumers may make and consume copies that are imperfect substitutes for the original information good. If there is a significant increase in the willingness-to-pay of some low-valuation consumers after they experience the information good, the firm can extract the increased consumer surplus by enforcing a positive level of copyright protection in the second period. Social welfare, however, is maximized in the case of no enforcement.

  • PDF

A Novel Approved Mathematical Equation for Lightning Protection Angle

  • Singhasathein, Arnon;Rungseevijitprapa, Weerapun;Pruksanubal, Aphibal
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.1021-1029
    • /
    • 2018
  • During the past few decades, the lightning protection angle (${\alpha}$) has been proposed through several technical matters, namely graphical technique, numerical data and mathematical equation respectively. Nevertheless, these techniques are very complicated, and are difficult to utilize because they also contain several constraints practically. Hence, this paper proposes a novel equation of the lightning protection angle, which is a simple correlation, concise and easy to be implemented. Furthermore, the reliable result of this equation can confirm accuracy through comparative analysis with all previous techniques. As a result, these solutions are altogether equivalent. This novel equation can analyze the lightning protection angle of the vertical air termination system installed at the vertex of the royal pagoda in a Khema-pirataram temple which is at high risk due to lightning flashes.

Biometric Information Protection Measures in the Biometric Person Authentication System Using Match-on-Card (Match-on-Card를 사용한 생체 개인 인증 시스템에서의 생체정보 보호대책)

  • 이상곤;조대성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.237-246
    • /
    • 2003
  • To acquire certificate of security evaluation for information protection Products, it is necessary for a designer to grasp the threats listed in a protection profile and to reflect them in the product design. BDPP is a protection profile for the biometric devices. In this paper, we applied BDPP to a Match-on-Card, and ertracted some security requirements to protect biometric data against threats. We also studied some countermeasures satisfying the security requirements.

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

Literature Review and Current Trends of Automated Design for Fire Protection Facilities (화재방호 설비 설계 자동화를 위한 선행연구 및 기술 분석)

  • Hong, Sung-Hyup;Choi, Doo Chan;Lee, Kwang Ho
    • Land and Housing Review
    • /
    • v.11 no.4
    • /
    • pp.99-104
    • /
    • 2020
  • This paper presents the recent research developments identified through a review of literature on the application of artificial intelligence in developing automated designs of fire protection facilities. The literature review covered research related to image recognition and applicable neural networks. Firstly, it was found that convolutional neural network (CNN) may be applied to the development of automating the design of fire protection facilities. It requires a high level of object detection accuracy necessitating the classification of each object making up the image. Secondly, to ensure accurate object detection and building information, the data need to be pulled from architectural drawings. Thirdly, by applying image recognition and classification, this can be done by extracting wall and surface information using dimension lines and pixels. All combined, the current review of literature strongly indicates that it is possible to develop automated designs for fire protection utilizing artificial intelligence.

K-means clustering analysis and differential protection policy according to 3D NAND flash memory error rate to improve SSD reliability

  • Son, Seung-Woo;Kim, Jae-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.1-9
    • /
    • 2021
  • 3D-NAND flash memory provides high capacity per unit area by stacking 2D-NAND cells having a planar structure. However, due to the nature of the lamination process, there is a problem that the frequency of error occurrence may vary depending on each layer or physical cell location. This phenomenon becomes more pronounced as the number of write/erase(P/E) operations of the flash memory increases. Most flash-based storage devices such as SSDs use ECC for error correction. Since this method provides a fixed strength of data protection for all flash memory pages, it has limitations in 3D NAND flash memory, where the error rate varies depending on the physical location. Therefore, in this paper, pages and layers with different error rates are classified into clusters through the K-means machine learning algorithm, and differentiated data protection strength is applied to each cluster. We classify pages and layers based on the number of errors measured after endurance test, where the error rate varies significantly for each page and layer, and add parity data to stripes for areas vulnerable to errors to provides differentiate data protection strength. We show the possibility that this differentiated data protection policy can contribute to the improvement of reliability and lifespan of 3D NAND flash memory compared to the protection techniques using RAID-like or ECC alone.

Identifying Stakeholder Perspectives on Data Industry Regulation in South Korea

  • Lee, Youhyun;Jung, Il-Young
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.14-30
    • /
    • 2021
  • Data innovation is at the core of the Fourth Industrial Revolution. While the catastrophic COVID-19 pandemic has accelerated the societal shift toward a data-driven society, the direction of overall data regulation remains unclear and data policy experts have yet to reach a consensus. This study identifies and examines the ideal regulator models of data-policy experts and suggests an appropriate method for developing policy in the data economy. To identify different typologies of data regulation, this study used Q methodology with 42 data policy experts, including public officers, researchers, entrepreneurs, and professors, and additional focus group interviews (FGIs) with six data policy experts. Using a Q survey, this study discerns four types of data policy regulators: proactive activists, neutral conservatives, pro-protection idealists, and pro-protection pragmatists. Based on the results of the analysis and FGIs, this study suggests three practical policy implications for framing a nation's data policy. It also discusses possibilities for exploring diverse methods of data industry regulation, underscoring the value of identifying regulatory issues in the data industry from a social science perspective.

FLAME DETECTOR의 응답특성연구

  • Lee, Bok-Yeong
    • Fire Protection Technology
    • /
    • s.18
    • /
    • pp.5-16
    • /
    • 1995
  • The capacity commonly required sensors includes capability of quickly and properly catching the conditions of a fire and discriminating other factors such as noise, interference, etc. IR flame detector which react to the infra-red rays emitted from the flame. This study is aimed to know the characteristic repond to the specified fire plate. Experiment is acted by manufacture's technical data that is explained relation of detective range and sensitivity.

  • PDF

Rapid Corrosion Test on Marine Reinforcing Steel (부식촉진에 의한 해양.항만 철근 콘크리트 구조물의 철근 방식에 관한 실험적 연구)

  • 정근성;문홍식;송호진;이상국;정영수
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2001.11a
    • /
    • pp.537-542
    • /
    • 2001
  • Recently long-span bridges, such as Kwang-Ahn Grand bridge, Seo-Hae Grand Bridge, Young-Jong Grand Bridge, etc, have been designed and constructed near the shore. It needs to maintain the durability of marine concrete structures which are exposed to severe chloride environments. It is well known that corrosion of reinforcement steels in concrete structure is the most important cause for the durability of concrete structure which can be controlled by systematic preparatory corrosion protection works for economic and safe infrastructures. Various corrosion protection systems have been used for the corrosion protection of reinforcement steels from detrimental chemical components such as chloride, sulphate and etc. Since chloride can be penetrated into concrete in a variety way, an effective method has to be adopted by taking into full economical aspects and technical data of each protection system. The objective of this experimental study is to investigate the corrosion behavior of reinforcing steel in laboratory concrete specimens which are exposed to cyclic wet and dry saltwater, and then to develop pertinent corrosion protection system, such as corrosion inhibitors and cathodic protection for reinforced concrete bridges exposed to chloride environment. Resistance of various corrosion inhibitors and impressed current system have been experimentally evaluated under severe environmental conditions, and thus effective corrosion protection systems could have been Practically developed for future concrete construction.

  • PDF