• Title/Summary/Keyword: Information Communication Law

Search Result 362, Processing Time 0.024 seconds

A Study on the Maritime Law According to the Occurrence of Marine Accidents of MASS(Maritime Autonomous Surface Ship) (자율운항선박의 해양사고 발생에 따른 해상법적 고찰)

  • Lee, Young-Ju
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 2023
  • Recently, with the rapid development of ICT(Information and Communication Technology) and AI(Artificial Intelligence) technology industries, the emergence of MASS(Maritime Autonomous Surface Ship), which were thought only in the distant future, is approaching a reality. Along with the development of these amazing technologies, changes in the private law sector, such as liability, compensation for damages, and maritime insurance, as well as in the public law sector, such as maritime safety, marine environment protection, and maintenance of maritime order, have become necessary in the field of maritime law. In particular, with the advent of a new type of ship called MASS that does not have a crew on board, the kind and type of liability, compensation for damages, and insurance contracts in the event of a marine accident will also change. In this paper, the general theory about concept, classification, effectiveness and future of MASS and the general theory about concept and various obligations and responsibilities under the maritime law for discussion of MASS are reviewed. Next, in addition, regarding the problems that may occur in the event of a marine accident from MASS, the status as a ship, the legal relationship of the chartering contract, obligation to exercise due diligence in making the vessel seaworthiness, subject of responsibility, and liability for damages and immunity are reviewed from the perspective of maritime law. In addition, in the degree four of MASS, the necessities of further research to clarify the attributable subjects and standards of responsibility in the event of a marine accident, as well as the necessities of institutional improvement such as technology development, enactment and amendment of law and funding are presented.

  • PDF

A Study on Limitations on the Right of Reproduction and Right of Communication to the Public in Digital Networked Environment (디지털 복제권 및 전송권 제한에 관한 연구)

  • 정경희;이두영
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.127-142
    • /
    • 2001
  • It has been criticized that the right of reproduction and right of communication to the public in the Copyrigt Act of Korea, which was amended in the year of 2000 in line with new environments around digital networks, limited the limitation to author’s property right in private use and library exemption too much. Solving the problem above, this study analyzes comparatively WCT, Amended Proposal for a Directive on Copyright and Related Rights in the Information Society, Copyright Law of the United States of America, Copyright Amendment(Digital Agenda), and Copyright Act of Korea. Based on the results from related case analyses and a survey on how stakeholders view copyright issue, in addition, this study presents a reasonable way of limiting rights of reproduction and rights of communication to the public.

  • PDF

Evolutionary Signature of Information Transfer Complexity in Cellular Membrane Proteomes

  • Kim, Jong-Min;Kim, Byung-Gee;Oh, S.-June
    • Genomics & Informatics
    • /
    • v.7 no.2
    • /
    • pp.111-121
    • /
    • 2009
  • Cell membrane proteins play crucial roles in the cell's molecular interaction with its environment and within itself. They consist of membrane-bound proteins and many types of transmembrane (TM) proteins such as receptors, transporters, channel proteins, and enzymes. Membrane proteomes of cellular organisms reveal some characteristics in their global topological distribution according to their evolutionary positions, and show their own information transfer complexity. Predicted transmembrane segments (TMSs) in membrane proteomes with HMMTOP showed near power-law distribution and frequency characteristics in 6-TMS and 7-TMS proteins in prokaryotes and eukaryotes, respectively. This reaffirms the important roles of membrane receptors in cellular communication and biological evolutionary history.

On the (n, m, k)-Cast Capacity of Wireless Ad Hoc Networks

  • Kim, Hyun-Chul;Sadjadpour, Hamid R.;Garcia-Luna-Aceves, Jose Joaquin
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.511-517
    • /
    • 2011
  • The capacity of wireless ad-hoc networks is analyzed for all kinds of information dissemination based on single and multiple packet reception schemes under the physical model. To represent the general information dissemination scheme, we use (n, m, k)-cast model [1] where n, m, and k (k ${\leq}$ m) are the number of nodes, destinations and closest destinations that actually receive packets from the source in each (n, m, k)-cast group, respectively. We first consider point-to-point communication, which implies single packet reception between transmitter-receiver pairs and compute the (n, m, k)-cast communications. Next, the achievable throughput capacity is computed when receiver nodes are endowed with multipacket reception (MPR) capability. We adopt maximum likelihood decoding (MLD) and successive interference cancellation as optimal and suboptimal decoding schemes for MPR. We also demonstrate that physical and protocol models for MPR render the same capacity when we utilize MLD for decoding.

Using The Internet As A Tool For The Illicit Sale Of Drugs And Potent Substances

  • Manzhai, Oleksandr;Cherevko, Kyrylo;Chycha, Ruslan;Burlaka, Iryna;Piadyshev, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.246-250
    • /
    • 2022
  • The article analyzes the regulations of current criminal law and current issues, combating drug crime on the Internet, as well as measures to combat drug crime in the field of modern information technology. In connection with the growth of crimes in the field of drug trafficking committed with the use of information and telecommunications technologies, the urgent task of the state is to find effective ways to reduce drug crime. The article considers criminologically significant aspects of the mechanism of illicit drug trafficking, which is carried out with the use of information and telecommunication technologies and means of remote communication.

A Framework and Guidelines for Personal Data Breach Notification Act (개인정보 유출 시 통지.신고 프레임워크 및 가이드라인)

  • Lee, Chung-Hun;Ko, Yu-Mi;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.169-179
    • /
    • 2011
  • Recent personal data breach incidences draw the public's attention to their privacy and personal rights. The new personal data protection law effective in September 2009 imposes additional legal responsibility on personal data controllers and processors. For instance, if a data breach occurs, this new law requires that the processors must notify individuals (data subjects) and data protection authorities of the nature of incidents. This research reviews the U.S. forty six state laws and related acts, and offers a framework for managing incidents. This framework includes five major components: (1) type of personal data required to be reported and notified, (2) the ultimate subject notifying data subjects, (3) event occurrence and notification time phases, (4) notification message details, and (5) direct/indirect communication media. Along with this framework, we also offer directions for effective/manageable guidelines on data breach notification act.

A Study on Analysis of Personal Information Risk Using Importance-Performance Analysis (IPA를 이용한 개인정보 위험도 분석 연구)

  • Jeong, Su-Jin;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.267-273
    • /
    • 2015
  • For newly incoming technologies owing to the advancements in information and communications technology, the new form of information occurs due to the combination form of personal information. In turn, personal information which is combination with existing personal information is on the increase. It is difficult to equalize the method in order to analysis the degree of risk for personal information because it is qualitative method which is defined on the current Personal Information Protection Law. This dissertation presents the model to assess the degree of risk by using the IPA(Importance-Performance Analysis) after measuring the importance and the weighted value for the personal information based on the existing the method of risk assessment. Through the model suggested in this dissertation, the subjective judgement can be excluded, the combination of personal information can be assessed and the standard criteria which is used as the objective indicators from the quantitative degree of risk can be suggested.

ICT-oriented Training of Future HEI Teachers: a Forecast of Educational Trends 2022-2024

  • Olena, Politova;Dariia, Pustovoichenko;Hrechanyk, Nataliia;Kateryna, Yaroshchuk;Serhii, Nenko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.387-393
    • /
    • 2022
  • The article reflects short-term perspectives on the use of information and communication technologies in the training of teachers for higher education. Education is characterized by conservatism, so aspects of systematic development of the industry are relevant to this cluster of social activity. Therefore, forecasting the introduction of innovative elements of ICT training is in demand for the educational environment. Forecasting educational trends are most relevant exactly in the issues of training future teachers of higher education because these specialists are actually the first to implement the acquired professional skills in pedagogical activities. The article aims to consider the existing potential of ICT-based learning, its implementation in the coming years, and promising innovative educational elements that may become relevant for the educational space in the future. The tasks of scientific exploration are to show the optimal formats of synergy between traditional and innovative models of learning. Based on already existing experience, extrapolation of conditions of educational process organization with modeling realities of using information and communication technologies in various learning dimensions should be carried out. Educational trends for the next 3 years are a rather tentative forecast because, as demonstrated by the events associated with the COVID-19 pandemic, the socio-cultural space is very changeable. Consequently, the dynamism of the educational environment dictates the need for a value-based awareness of the information society and the practical use of technological advances. Thus, information and communication technologies are a manifestation of innovative educational strategies of today and become an important component along with traditional aspects of educational process organization. Future higher education teachers should develop a training strategy taking into account the expediency of the ICT component.

Institutionalization for the Real Estate Electronic Commerce System (부동산정보윤리의 개념 정립 및 부동산정보윤리 확립 방안에 관한 연구)

  • Lee, Kook-Chul;Kang, Byung-Gi;Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.129-142
    • /
    • 2008
  • The present paper questionable matter and necessity of real estate information ethics, triangular position method etc. is an escape and for is. And currently the real estate information ethical violate action where becomes the problem the plan which raises an ethical level is an escape and for is. Preceding research led first of all and justice a real estate information ethics and necessity, scope, function and basic principle escape. Also at current law escape sent 'accidental incorrect reports', 'preservation of the list must erase', 'light plagiarism' and 'information is inappropriate managed' in the object of the real estate information ethics which excepts the illegal act. With the real estate relation specialty led interview together and currently actual condition real estate current price information where becomes the problem and article for sale information type nonly-ethical and also the cause analyzed together. This led and also the real estate information ethical raising plan did escape together.

  • PDF

Improvement Research for Information Protection Management System of Small and Medium Enterprises (중소기업의 정보보호 관리체계 개선방안 연구)

  • Hye-Joung Yun;Yong-Woo Lee;Hee-Doo Heo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.15-20
    • /
    • 2023
  • Recently, digitalization is accelerating in all industries, and the use of information and personal information produced and used in the process of it is very important for the success or failure of a company. However, malicious attempts to steal or leak major information and personal information of a company as an adverse effect continue to increase, and appropriate defense and response are absolutely necessary. However, in the case of small and medium-sized enterprises, the priority of information protection and the possession of professional manpower are very insufficient compared to large enterprises. This paper studies the certification and audit implemented in Korea, and suggests ways to expand the certification of the information protection system suitable for SMEs and improve the effectiveness of the support system through the expansion of the privacy law notification standard and operation of support system.