• Title/Summary/Keyword: Information Protection Practice

Search Result 118, Processing Time 0.022 seconds

N-ary Information Markets: Money, Attention, and Personal Data as Means of Payment

  • Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.3
    • /
    • pp.6-14
    • /
    • 2020
  • On information markets, we can identify different relations between sellers and their customers, with some users paying with money, some paying with attention, and others paying with their personal data. For the description of these different market relations, this article introduces the notion of arity into the scientific discussion. On unary information markets, customers pay with their money; examples include commercial information suppliers. Binary information markets are characterized by one market side paying with attention (e.g., on the search engine Google) or with personal data (e.g., on most social media services) and the other market side (mainly advertisers) paying with money. Our example of a ternary market is a social media market with the additional market side of influencers. If customers buy on unary markets, they know what to pay (in terms of money). If they pay with attention or with their personal data, they do not know what they have to pay exactly in the end. On n-ary markets (n greater than 1), laws should regulate company's abuse of money and-which is new-abuse of data streams with the aid of competition (or anti-trust) laws, and by modified data protection laws, which are guided by fair use of end users' attention and data.

Improvement Issues of Personal Information Protection Laws through Meta-Analysis (메타분석을 통한 개인정보보호법의 개선과제)

  • Cho, Myunggeun;Lee, Hwansoo
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.1-14
    • /
    • 2017
  • As we enter the era of big data, the value of personal information is becoming ever more important. However, personal information protection laws in Korea have several issues. Furthermore, existing research are limited in their ability to facilitate a comprehensive understanding of measures to improve personal information protection laws. Accordingly, this study analyzes improvements to be made in the current personal information protection laws based on existing research. A total of 39 research articles discussing the problems of the personal information protection law were selected and analyzed by applying the meta - analysis technique. According to the results, the various issues such as the meaning and scope of personal information, the role and obligations of relevant parties, provision of personal information to third parties, and redundant and imbalanced regulations in special acts in each field. that exist in the current personal information protection laws were confirmed. This study contributes to the improvement of inconsistency between information protection laws and related special laws in each field in practice. Academically, it will contribute to understanding the problems of th law from the macro perspective and suggesting the integrated improvement ways of the law.

Analysis of Elements Related to Information Culture Literacy in Overseas Informatics Curriculums (해외 정보 교육과정에서 정보문화소양 관련 내용 요소 분석)

  • Yang, HyeJi;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.21 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Korea shifted the focus to competency-based curriculums in the revised national curriculum of 2015, and emphasized training creative convergence talents through informatics education. The informatics education curriculum included information culture literacy as a core competence so that the learners can gain knowledge of information technology-based information ethics and make ethical judgment and practice ethics. This study analyzed the elements related to information culture literacy in the informatics curriculums of the US, the UK, India, Japan, Australia and Germany for the purpose of providing implications with regard to the composition of elements that can foster information culture literacy. According to the analysis results, first, the term information culture literacy was included only in the informatics education curriculum of Korea. Second, the elements common to all countries are (personal) information protection, information security and copyright. Third, Korea's information society and career, India's avoidance of injuries, Germany's protection of health and environment were found only in the curriculums of respective countries. This study is significant in that it provided the orientation of improving the elements for fostering information culture literacy based on the results of analyzing overseas informatics curriculums.

Interactional Discussions on Certain Issues in Interactional Commerce Arbitration Practice -With respect to Discussions at UNCITRAL Thirty-second Session- (국제상사중재 실무상의 문제점에 관한 국제적 논의동향 - UNCITRAL 제32차 본회의 논의를 중심으로 -)

  • Lee, Kang Bin
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.115-137
    • /
    • 1999
  • The UNCITRAL, during its thirty-two session in 1999 discussed certain issues and problems identified in interactional commercial arbitration practice. The issues discussed include certain aspects if conciliation proceedings ; the legislative requirement of a written form for the arbitration agreement ; arbitability ; soverign immunity ; consolidation of more than one case into one arbitral proceedings ; confidentiality of information in arbitral proceedings ; rasing claims in arbitral proceedings for the purpose of set-off ; decisions by "turncated" arbitral tribunals liability of arbitrators ; power by the arbitral tribunal to award interest ; costs of arbitral proceedings ; enforceability of interim measures of protection ; and discretion to enforce an award that has been set aside in the state of origin. Among those issues discussed, most of States agreed that the issues relating to certain aspects of conciliation proceedings ; the legislative requirement of a written form for the arbitration agreement ; enforceability of interim measures of protection ; and discretion to enforce an award that has been set aside in the State of origin should have priority over other issues. The UNCITRAL may wish to consider the desirability of preparing uniform provisions on any of those issues, possibly indicating whether further work should be towards a legislative text (such as a model legislative provision or a treaty) or a non-legislative text (such as a model contractual rule).

  • PDF

Design and implementation on Safety assesment system for security threat analyzing (보안 위험분석을 위한 안정성 평가 시스템 설계 및 구현)

  • Cho, Kyoung-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.333-339
    • /
    • 2007
  • Risk of damage on information system being grow according to increasing its dependence rate on most of organization. On this work, make planed for a safety assessment system in which information protection management system and threat analyzing method. Also, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization, an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

Effects of viscous damping models on a single-layer latticed dome during earthquakes

  • Zhang, Huidong;Wang, Jinpeng;Zhang, Xiaoshuai;Liu, Guoping
    • Structural Engineering and Mechanics
    • /
    • v.62 no.4
    • /
    • pp.455-464
    • /
    • 2017
  • Rayleigh damping model is recommended in the recently developed Performance-Based Earthquake Engineering (PBEE) methodology, but this methodology does not provide sufficient information due to the complexity of the damping mechanism. Furthermore, each Rayleigh-type damping model may have its individual limitations. In this study, Rayleigh-type damping models that are used widely in engineering practice are discussed. The seismic performance of a large-span single-layer latticed dome subjected to earthquake ground motions is investigated using different Rayleigh damping models. Herein a simulation technique is developed considering low cycle fatigue (LCF) in steel material. In the simulation technique, Ramberg-Osgood steel material model with the low cycle fatigue effect is used to simulate the non-uniformly distributed material damping and low cycle fatigue damage in the structure. Subsequently, the damping forces of the structure generated by different damping models are compared and discussed; the effects of the damping ratio and roof load on the damping forces are evaluated. Finally, the low cycle fatigue damage values in sections of members are given using these damping models. Through a comparative analysis, an appropriate Rayleigh-type damping model used for a large span single-layer latticed dome subjected to earthquake ground motions is determined in terms of the existing damping models.

Information Security Class Improvement Plan to Cultivate Security Professionals - Focusing on Specialization Course (보안 전문 인력 양성을 위한 정보보안 수업 개선 방안 - 특성화 과정을 중심으로)

  • Park, Jung-Oh
    • Journal of Industrial Convergence
    • /
    • v.20 no.3
    • /
    • pp.23-31
    • /
    • 2022
  • Recently, the importance of the role of the university information security department in nurturing security experts to defend against cyber attacks is increasing day by day. The current university security curriculum has a problem in that the proportion of theoretical education is high and the professionalism of practical education is relatively low. This study analyzed the recent educational programs of domestic and foreign security education institutions for the purpose of improving the practical ability of the Department of Security, designing a class model suitable for the core specialization process, and suggesting the direction. The proposed model improves the existing problems of basic class connection and security practice curriculum roadmap, and additionally explains the practice program of the five core specialized subjects. This study intends to contribute to the improvement of the quality of the curriculum and educational model of each university's security department.

Prototype Design of Medicine Information System based on Mobile to check medicinal misusing (약물 남용 방지를 위한 모바일 기반 의약품 정보 시스템의 프로토타입 설계)

  • Kim, Ha-Gang
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.112-123
    • /
    • 2011
  • Recently, the Korean Pharmaceutical Association has a public service advertisements for medicinal misusing prevention and environment protection by medicinal substances. And the cost and procedure complexity was increased by specialization of dispensary and medical practice. To overcome this situation, we have use for medicine information system. Ubiquitous and convergence technology have become trends in the IT field. In this paper, we designed prototype of medicine information system and drug image searching based on mobile for management and prevention of medicinal misusing using IT technologies.

Evaluation Tool for Analyzing Method of the Information System (정보시스템 위험분석 평가도구)

  • Kim, Kang;Cho, Kyoung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.773-777
    • /
    • 2007
  • Very various infusion by development of systems that is based on network is spread. Therefore, Evaluation Tool has been an active research area to reduce the risk from intrusion. On this thesis, during threat assesment, we have planned possible an equal-weight applied assesment and considering the characteristics of the organization an assesment which security factor's weight is variably applied to, and respective organizations to examine its security by itself in order to support the easy findings of the vulnerabilities on the management point of view, and to show the advices to practice.

  • PDF

Implementation of 3D Animation Software for an Environment Education of the Young children Using 3D MAX (3D MAX를 이용한 유아의 환경교육용 3D 애니메이션 소프트웨어 구현)

  • Oh, Taek-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.623-625
    • /
    • 2007
  • The education of kindergarten children through 3D animation software, introducing them to water pollution a most serious environmental problem through this software program, children learn about environmental protection and how to practice it. also we provide about publicity animation content for the environment education at kindergarten. so we can show and teach to the infants systematic environment education by improving their environment understanding and sensibility and then we are realized 3D animation that we can bring up in practice direction in the kindergarten.

  • PDF