• Title/Summary/Keyword: Free Access to Information

Search Result 246, Processing Time 0.027 seconds

A study on the professional ethical relationship between librarian and library work (도서관 업무와 전문사서간의 윤리적 관계에 관한 이론적 고찰)

  • 손연옥
    • Journal of Korean Library and Information Science Society
    • /
    • v.24
    • /
    • pp.485-517
    • /
    • 1996
  • The purpose of this study is to investigate typical ethical problems found in the technical and public services areas. The followings are the summary of the study. There are three distinct elements that govern ethical problems. One element is legal laws. The copyright law and the privacy act are exact examples. The copyright law has strong influence on the inter library loan service where the majority requests from the users are reproduction of copies. The privacy act also creates difficulties for librarians. Most requests for circulation records infringe on the privacy of library user. And advance online access systems also violates the privacy of library users. The second element is the code or rules that private organization has created. American Library Association created many statements that regulate the conduct of librarians. The bill of right, the professional code of ethics and policy on the confidentiality of library records have strong implications in the obligation of librarian. In the case of censorship at the selection of library materials, the code is a defensive tool against intellectual freedom. Yet self-censoring are prevailing practice among librarians. The thirds element is the competence of librarians. The analyzed table 3 showed that beside two elements, the rest of matters are competence required by librarians. The one aspect of it is humaneness and the other one is technical aspects. Technical aspect of competence are:(l) managerial and operational ability (2) communication skill (3) leadership (4) structure of knowledge and (5) self developing professionalism. Humanity aspect of competence are:(l) trust(fiduciary relationship) gained by diligence, objective judgement, ability, belief, rationality, integrity, kindness) (2) objectiveness (free from bias) (3) user-oriented consideration (need, interest, equal treatment, information gap) (4) caution in providing information (5) pride and (6) ability to distinguish advice and guidance specially in medical and law library.

  • PDF

Development of Embedded based Sea Operation Monitoring System (임베디드 환경의 해상작업 모니터링 시스템 개발)

  • Jung, Sung-Hun;Rhee, Bong-Keun;Yim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.93-97
    • /
    • 2005
  • Sea operation monitoring system is a system for the automatic ship operation that is used on the variety sea operations such as laying optical cables on the sea between the countries, laying cables on the seabed for a remote island, laying pipelines for the natural gas, and so forth. This system processes data which optained through setting up environment and input from several sensors, and display GPS information with ENC data. And this system processes not only data of root file about sea operation, but also realtime information from PDA of client wirelessly connected with AP on wireless LAN, In addition, this system can improve efficiency of the operation as a result of enabling free movement within valid range. This paper design and Implementation Monitoring system from above appropriate to the embedded system, and improve competitive power of ship through prevention of a ship accident, to keep minimizing operation loads and support both the automatic ship operation and the safety voyage.

  • PDF

Extending VNC Server and Client for Sharing Clipboard Contents Composed of Text and Images (텍스트와 이미지로 구성된 클립보드 콘텐츠 공유를 위한 VNC 서버와 클라이언트의 확장)

  • Lee, Tae-Ho;Lee, Hong-Chang;Park, Yang-Su;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.115-126
    • /
    • 2008
  • VNC(Virtual Network Computing) is a desktop sharing system based on the RFB(Remote Framebuffer) protocol which allows you to control a remote computer running a VNC server through a VNC client(or viewer) on a local computer. To exchange information between the two computers, VNC provides the functionality of sharing the clipboard contents. Unfortunately, the current VNC softwares support only the clipboard text contents, not providing methods for sharing the clipboard multimedia contents such as images. In this paper, we extend the RFB protocol to share the clipboard contents composed of text and images. Also, to support the developed protocol. we extend both the UltraVNC server and the JavaViewer VNC client which are free open-source softwares. Through the developed VNC softwares, users can exchange the clipboard contents including texts and images between the remote computer and the local computer.

  • PDF

A Normative Approach to Data Democracy (데이터 민주주의(data democracy)에 대한 규범적 접근)

  • Heejin Park;Ji Sung Kim
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.2
    • /
    • pp.137-158
    • /
    • 2023
  • In the modern digitized data society, there is a growing emphasis on securing trustworthiness and fairness in data utilization, along with data openness. By defining the concept of data democracy from various perspectives and presenting elements of normative values, this study aims to provide a basic conceptual framework to identify and evaluate the data governance system and levels of data democracy. As a foundation for the discussion of data democracy, based on Kneuer's (2016) conceptualization of e-democracy, free and equitable access, e-participation, and e-government were introduced as core dimensions of e-democracy. To improve the quality of data governance and foster a better understanding and practical application of the concept of data democracy, this study takes a normative approach from the perspective of democracy. Inclusiveness, equity, participation, and democratic sovereignty are provided as core dimensions of data democracy. This study highlights the significance of data literacy in promoting data democracy. It proposes the creation and assessment of a curriculum rooted in the normative principles of data democracy within the field of library and information science for future investigation.

A Study of FC-NIC Design Using zynq SoC for Host Load Reduction (호스트 부하 경감 달성을 위한 zynq SoC를 적용한 FC-NIC 설계에 관한 연구)

  • Hwang, Byeung-Chang;Seo, Jung-hoon;Kim, Young-Su;Ha, Sung-woo;Kim, Jae-Young;Jang, Sun-geun
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.423-432
    • /
    • 2015
  • This paper shows that design, manufacture and the performance of FC-NIC (fibre channel network interface card) for network unit configuration which is based on one of the 5 main configuration items of the common functional module for IMA (integrated modular Avionics) architecture. Especially, FC-NIC uses zynq SoC (system on chip) for host load reductions. The host merely transmit FC destination address, source memory location and size information to the FC-NIC. After then the FC-NIC read the host memory via DMA (direct memory access). FC upper layer protocol and sequence process at local processor and programmable logic of FC-NIC zynq SoC. It enables to free from host load for external communication. The performance of FC-NIC shows average 5.47 us low end-to-end latency at 2.125 Gbps line speed. It represent that FC-NIC is one of good candidate network for IMA.

A Study on the Intention of Continuous use of MOOC Applying Self-Determination Theory and Learning Flow Theory : Focused on Differences between Korean and Chinese Culture (자기결정성이론과 학습몰입이론을 적용한 MOOC 지속사용의도에 관한 연구 : 한·중 문화차이 분석)

  • Jin, Qiuxiang;Chi, Yong Duk;Gim, Gwangyong
    • Journal of Information Technology Services
    • /
    • v.17 no.1
    • /
    • pp.121-134
    • /
    • 2018
  • Massive Open Online Course (MOOC) is online education that anyone can register for free and has internet access. MOOC is also called Education Revolution and is spreading rapidly all over the world. Although recent MOOC high-quality classes may enhance the value of MOOC, MOOC learning still needs much research. Since MOOC has low learning completion rate and continuous use rate, various studies on the reasons that learners give up at the beginning of learning have not been tried yet This research is studied for the continuous intention of use of MOOC applying self-determination theory and learning flow theory based on technology acceptance model. In particular, the research are conducted for cultural difference in continuous usage of MOOC between Korean and Chinese. The research results show that self-determination theory applying perceived autonomy, perceived competence, and perceived relatedness and learning flow is useful to explain continuous use of MOOC. The research also shows that Hofstede theory works well in explaining the cultural difference between Korea and China in continuous usage of MOOC. The result shows that korean is more influenced by perceived external motivation like perceived usefulness and chinese is more influenced by internal motivation like learning flow in continuous use of MOOC.

A Study on Interconnection Regime: Core Issues and Alternatives (국내 상호접속제도 연구: 핵심이슈와 대안 발굴)

  • Kim, Il-Jung;Shin, Minsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.678-691
    • /
    • 2015
  • Internet and mobile traffic continues to surge exponentially in recent years due to popularization of smart devices, the appearance of various internet services carrying large amount of traffic from richer content and applications. This phenomenon leaded to various network problems such as the congestion delay, the non-balanced traffic ratio between ISPs, the continuous network investment cost and the Internet access problems. In light of changed data-driven communication ecosystem, There are growing concerns by both academia and industry that settlement-free peering and full transit regime have the limitations such as not only difficulties in maintaining mutual benefits but also difficulties in securing investment incentives for upgrading network performance and quality. Thus, it becomes more necessary for introducing the evolved internet interconnection regime which can fulfill the All-IP network environment. This study derives core issues regarding internet interconnection regime in Korea and suggest new evolved alternatives based on three point of view(traffic optimization, cost optimization, network investment optimization) through the empirical analysis.

Analysis of Non-Barrier Space to Promote the Uses of Convenience Facilities at Passenger Facilities by the Visually Handicapped (시각장애인의 여객시설 내부편의시설 이용증진을 위한 무장애 공간 분석(광명역을 중심으로))

  • Kim, Dong-Moon;Kim, Hwang-Bae;Park, Jae-Kook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.2
    • /
    • pp.31-40
    • /
    • 2008
  • The indicators of an advanced society include the overall level of life quality and satisfaction among all the members. The overall life quality has close relationships with accessibility to urban space for the social weak. Access to facilities of interest and right of mobility in urban space are very important issues to the weak class in terms of transportation including the visually handicapped. In particular, great significance is endowed upon transfer facilities, which play mediating roles between facilities like passenger facilities, and the convenience facilities inside for the disabled, which are usually the only means for the disabled to access each facility. As they are provided to the visually handicapped as well, it's very important to analyze the concerned spatial distribution and offer the results. The previous studies on the subject, however, merely covered the perceptions of the users and the related statistical analysis. This study set out to analyze non-barrier space to promote the utilization of convenience facilities at passenger facilities by the visually handicapped and to secure their right of mobility by using a GIS for spatial analysis based on spatial data. The results show that it's urgent to supplement the existing space for the handicapped and that it's necessary to expand convenience facilities for the disabled such as paths with Braille points on them to promote their use of diverse convenience facilities inside.

  • PDF

Design and Implementation of Sea Operation Monitoring System based on ENC (전자해도 기반의 해상작업 모니터링 시스템 설계 및 구현)

  • Jung Sung-Hun;Yim Jae-Hong
    • Journal of Navigation and Port Research
    • /
    • v.30 no.3 s.109
    • /
    • pp.189-195
    • /
    • 2006
  • Sea operation monitoring system is a system for the automatic ship operation that is used on the variety sea operations such as laying optical cables on the sea between the countries, laying cables on the seabed for a remote island, laying pipelines for the natural gas, and so forth. This system processes data which obtained through setting up environment and input from several sensors, and display GPS information with ENC data. And this system processes not only data of route file about sea operation, but also realtime information from PDA of client wirelessly connected with AP on wireless LAN. In addition, this system can improve efficiency of the operation as a result of enabling free movement within valid range. This paper design and implementation monitoring system from above appropriate to the embedded system, and improve competitive power of ship through prevention of a ship accident, to keep minimizing operation loads and support both the automatic ship operation and the safety voyage.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.