• Title/Summary/Keyword: Information Protection Law

Search Result 346, Processing Time 0.027 seconds

A Study on the Activity Improvement Plan for Consumer ADR of Non-Government Consumer Organization (민간 소비자단체의 자율분쟁조정 활성화방안)

  • Kim, You-Jin;Kim, Si-Wuel
    • Journal of Families and Better Life
    • /
    • v.25 no.4
    • /
    • pp.197-216
    • /
    • 2007
  • The Purpose of this research is to perform survey on employees of Non-Government Consumer Organization and interview with ADR personnel from Korean Consumer Protection Board to have thorough grasp of problems among consumer ADR. Also come up with plan that will activate Non-Government Consumer organization ADR. Result of this research states following remarks as solution First, consumers from Seoul and Gyeonggi area is the only people who use ADR in Non-Government Consumer organization, so other local governments need to concentrate on consumers from rural area to take advantage of the service. Second, low activity of ADR and legal procedure support compare to other services provide from Non-Government Consumer organization. Third, statistic shows that employees from Non-Government Consumer organization recognize importance of consumer's ADR and government's support as well as enforcement of law. Forth, the preparation of Consumer ADR in Non-Government Consumer organization, selecting committee is the most important procedures are reinforce human resource, improvement of organization structure. Fifty, order to establish Consumer ADR in Non-Government Consumer organization, recruit professional manpower is the priority and financial support is also important. All these result would help improve the activity of ADR in Non-Government Consumer organization, which will lead the organization to be more professionalize, globalize and able to segment the market. Further more, Non-Government Consumer organization would develop better ways to take itself to another level to provide better service. Also, create an institution that will help consumer's dispute and legal procedure. It will prevent future victims and protect consumer's right.

Interpretation of Safeguard Agreement and Application to Korean domestic law under the WTO (WTO 세이프가드 협정의 해석과 국내법에의 적용방안)

  • Lee, Eun-Sup;Kim, Neung-Woo
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.271-298
    • /
    • 2011
  • This paper seeks the proper and efficient operation of Korea's safeguard mechanism by examining the judicial interpretation and application of the safeguard measures under the WTO Safeguard Agreement. The judicial examination is focused on the terms of "unforeseen development" in GAIT XIX, "evaluation of all relevant factors", and "clear justification of measure" in Safeguard Agreement. Such an intensive examination. of the judicial interpretation is used for the comparative analysis of the Korea's domestic provisions to find out problems in operation and the interpretative and legislative responses to them. It is found that the Korea's adaptation of the Safeguard Agreement into the domestic provisions and the operation of such provisions in the practical field have generally been consistent with the WTO's basic principles and provisions. Korea's safeguard mechanisms should stably be operated for securing the proper protection of domestic industry under certain emerging circumstances. For such policy objective to be ensured, it is legislatively required to make additional provisions in line with the appellate body's consistent interpretations of the debating issues including the term of unforeseen development.

  • PDF

The Relationship between Impulsive Buying Stimulus and Buying Experience in Cable TV Home Shopping (CATV 홈쇼핑에서의 충동구매 자극 요인과 구매 경험과의 관련성)

  • 서미정;김혜선
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.3
    • /
    • pp.105-118
    • /
    • 2004
  • Cable TV Home Shopping is one of the popular distribution channels in modem society because of purchasing convenience and saving in shopping time. However, in spite of these advantages, there are some problems because of marketing strategies of many Cable TV shopping companies which stimulate impulse purchases. This study is aimed to find the relationship between buying experience and reaction to impulsive buying stimulus. This study can give a valuable insight in consumer education regarding impulsive purchase behavior in Cable TV home shopping. Study results can also give useful information on the direction of consumer campaign and consumer protection policies. The data was collected by using a questionnaire and the final 496 cases were analyzed by SPSS Win 10.0 program. The major finding were that: 1. Younger, more educated and unmarried consumers tend to response more to impulsive purchasing stimulus. 2. consumers with higher response to impulsive purchasing stimulus had more buying experience, higher shopping frequencies and spent more money in Cable TV home shopping than consumers with lower response. These study results showed that there are some relationship between impulse purchasing stimulus and buying experience in Cable TV home shopping. Therefore, Cable TV Home Shopping companies should provide correct information to the consumers, so they can make resonable decisions. And the consumers should also try to restrain themselves from purchasing impulsively. A law that will regulate all false or exaggerated ads should be provided. To reach righteous and beneficial home shopping culture for both consumer and companies, all these means should be cooperated.

A Case Study: Unsupervised Approach for Tourist Profile Analysis by K-means Clustering in Turkey

  • Yildirim, Mustafa Eren;Kaya, Murat;FurkanInce, Ibrahim
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Data mining is the task of accessing useful information from a large capacity of data. It can also be referred to as searching for correlations that can provide clues about the future in large data warehouses by using computer algorithms. It has been used in the tourism field for marketing, analysis, and business improvement purposes. This study aims to analyze the tourist profile in Turkey through data mining methods. The reason relies behind the selection of Turkey is the fact that Turkey welcomes millions of tourist every year which can be a role model for other touristic countries. In this study, an anonymous and large-scale data set was used under the law on the protection of personal data. The dataset was taken from a leading tourism company that is still active in Turkey. By using the k-means clustering algorithm on this data, key parameters of profiles were obtained and people were clustered into groups according to their characteristics. According to the outcomes, distinguishing characteristics are gathered under three main titles. These are the age of the tourists, the frequency of their vacations and the period between the reservation and the vacation itself. The results obtained show that the frequency of tourist vacations, the time between bookings and vacations, and age are the most important and characteristic parameters for a tourist's profile. Finally, planning future investments, events and campaign packages can make tourism companies more competitive and improve quality of service. For both businesses and tourists, it is advantageous to prepare individual events and offers for the three major groups of tourists.

An Exploration on Personal Information Regulation Factors and Data Combination Factors Affecting Big Data Utilization (빅데이터 활용에 영향을 미치는 개인정보 규제요인과 데이터 결합요인의 탐색)

  • Kim, Sang-Gwang;Kim, Sun-Kyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.287-304
    • /
    • 2020
  • There have been a number of legal & policy studies on the affecting factors of big data utilization, but empirical research on the composition factors of personal information regulation or data combination, which acts as a constraint, has been hardly done due to the lack of relevant statistics. Therefore, this study empirically explores the priority of personal information regulation factors and data combination factors that influence big data utilization through Delphi Analysis. As a result of Delphi analysis, personal information regulation factors include in order of the introduction of pseudonymous information, evidence clarity of personal information de-identification, clarity of data combination regulation, clarity of personal information definition, ease of personal information consent, integration of personal information supervisory authority, consistency among personal information protection acts, adequacy punishment intensity in case of violation of law, and proper penalty level when comparing EU GDPR. Next, data combination factors were examined in order of de-identification of data combination, standardization of combined data, responsibility of data combination, type of data combination institute, data combination experience, and technical value of data combination. These findings provide implications for which policy tasks should be prioritized when designing personal information regulations and data combination policies to utilize big data.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

Propensity Analysis of Terrorism and Political Leaders Countermeasures (정치지도자 요인테러 성향 분석과 대응방안)

  • Kang, Kyoung Soo;Song, Sang Wook
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.3
    • /
    • pp.287-296
    • /
    • 2012
  • This study is analysis of the existing domestic terrorism factors and suggest countermeasures for political leadership that can occur to the precautionary terror occasion of the presidential election approached 100 days in the future. Political terror caused mainly achieved peak of Ideology or social conflict by Politically alienated class. Common cause is most likely to occur when the party or the government want to attack a target or can not stand disadvantaged and lose that I suppert the party or the government. 21st century political terror is occurred with Misfits of complaints expressed or social conflict more frequency than attack used random people, new weqpon and bomb. It is interpreted that issued as a drastic measure from individual complaint because of increased polarization of wealth by separate into group and fallen law and order but also we are not familiar with the political compromises. Personal safety escort mission is essential condition of political activity that Absolute personal protection and to come up with a large number of voters for best result. Thus security guard ought to professional security activity depend on gathered situation, location and regional feature for perfect protection service.

A Study on the Service Status of Public Domain Works in Digital Library: Focusing on the Case of the National Library of Korea's Expired Works Service (디지털도서관의 퍼블릭도메인 저작물 서비스 현황에 관한 연구: 국립중앙도서관의 보호기간 만료 저작물 서비스 사례를 중심으로)

  • Hosin Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.3
    • /
    • pp.119-142
    • /
    • 2023
  • Copyright is a legal criterion for determining the scope and method of digital library service. Works with expired protection periods correspond to the public domain and can be freely used by anyone. For this reason, it is a priority consideration in digital library construction and services. The purpose of this study is to examine how actively libraries are using expired protected works for digital library services. To this end, the relevant provisions of the Copyright Act applied to the construction and service of digital libraries were first summarized, and the meaning of the copyright protection period was theoretically examined. The current status of online services for expired works by the National Library of Korea was examined, focusing on the works of three Japanese colonial era writers, Kim Yoo-jung, Lee Hyo-seok, and Chae Man-sik, to check the specific service status of expired works. It reveals that the National Library of Korea is not fully utilizing the scope of the law, and that this situation is linked to the rights of other authors included in the book. Based on these results, it suggests that there is a need to change the service unit to focus on copyrighted works and to use authority records to systematize the management of authors' death years.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.