• Title/Summary/Keyword: Information and Communication Network Act

Search Result 71, Processing Time 0.027 seconds

A Study on the Algorithm Transparency Act and Right to Explanation - Focus on the Review of Algorithm Transparency Act -

  • Lee, Young-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.233-236
    • /
    • 2021
  • Recently, the Justice Party is pushing for legislation of a bill called the Algorithm Transparency Act. The bill is a revision to the Information and Communication Network Act proposed by Rep. Ryu Ho-jung on June 25, 2021, and aims to form a separate committee under the Korea Communications Commission to ask organizations operated for profit to search algorithms and explain the principles of arrangement. Currently, Korea treats algorithms as corporate secrets and does not disclose them, while the European Union (EU) implements the Personal Information Protection Regulations (GDPR) in relation to algorithm regulations. Therefore, this study summarizes the main contents of the Algorithm Transparency Act currently proposed to the National Assembly and reviews the current status of algorithm-related laws and systems in the European Union (EU) and the improvement of algorithm transparency.

A Survey on Methods for Analyzing Team Communication (팀의 의사소통 분석방법에 관한 연구)

  • Min, Dai-Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.2
    • /
    • pp.169-187
    • /
    • 2007
  • Most private and public organizations use, for their works, information systems that change their organizational structures. Nowadays, many organizations have team-based structures where typically a cross functional team is in charge of a business process. The effective communication among the members of a team is an important factor of team performance in that communication facilitates trust building, knowledge exchange, change acceptance, and safety improvement. This paper reviews methods for analyzing communication among team members from three aspects such as the content, the amount, and the structure of communication.

  • PDF

A Research on Institution's Countermeasure for Personal Information Protection Act Based on the Examples of Performing the Privacy Impact Assessment (개인정보 영향평가 수행 사례에 기반한 기관의 개인정보보호법 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.89-98
    • /
    • 2012
  • According to the enforcement of Personal Information Protection Act as of September 2011, the laws and regulations for the protection of personal information that were applied only to the certain sectors such as information & communication network, financial institutions, public sector etc. for the time being has been expanded to apply to all public and private sectors to process personal information. In particular, because the public institutions are obliged to be mandatorily conducted of the Privacy Impact Assessment, it will be enforced in earnest for each agency's informationization business that handles personal information. In this paper, I examine the most derived vulnerability and set up the improvement measure to supplement it with the examples of 10 of all the institutions conducting the Privacy Impact Assessment in the year 2011. And, I suggest the measures to be prepared by the institutions to observe the Personal Information Protection Act.

The Police Responsibility about Illegal Information on the Information Communication Network (정보통신망상의 불법정보에 대한 경찰책임)

  • Gu, Hyung-Keun;Joung, Soon-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.87-94
    • /
    • 2013
  • The existing legal regulations that indiscriminately distributed various illegal information on the information network are discussing focused on civil liability and criminal liability. however, at this paper that approached with problem of police responsibility as a target of the exert of police authority for blocking illegal information on the information network. based on this recognition, this paper propose the problem and reformation about the present Information Communication Networks law's 7 of Article 44, Section 2 that for prompt blocking illegal information on the information network, not about direct regulatory approach to a person in charge of act but about the information network service provider which is a person in charge of condition.

The Construction of the Vessel Monitoring System and the Protocol Analysis for the Calling of Location Requirement Using VHF-DSC (VHF-DSC 위치요청 프로토콜 분석과 선박관제시스템 구축)

  • Kim, Jeong-Nyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2800-2805
    • /
    • 2013
  • In preperation for the compulsory installation of VHF(Very High Frequency) wireless equipment and fishing vessel automatic identification system according to the revision of "The Ships Safety Act" and "Fishing Vessel act", Fishery Information & Communication Department of National Federation of Fisheries Cooperatives is building VHF communication network and automatic identification system for fishing vessel monitoring. This study suggests the protocol analysis for the calling of location requirement using DSC(Digital Selective Calling) function and show best way for fishing vessel automatic identification system. Also, it suggest way to realize fishing vessel monitoring system.

Classification of HTTP Automated Software Communication Behavior Using a NoSQL Database

  • Tran, Manh Cong;Nakamura, Yasuhiro
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.2
    • /
    • pp.94-99
    • /
    • 2016
  • Application layer attacks have for years posed an ever-serious threat to network security, since they always come after a technically legitimate connection has been established. In recent years, cyber criminals have turned to fully exploiting the web as a medium of communication to launch a variety of forbidden or illicit activities by spreading malicious automated software (auto-ware) such as adware, spyware, or bots. When this malicious auto-ware infects a network, it will act like a robot, mimic normal behavior of web access, and bypass the network firewall or intrusion detection system. Besides that, in a private and large network, with huge Hypertext Transfer Protocol (HTTP) traffic generated each day, communication behavior identification and classification of auto-ware is a challenge. In this paper, based on a previous study, analysis of auto-ware communication behavior, and with the addition of new features, a method for classification of HTTP auto-ware communication is proposed. For that, a Not Only Structured Query Language (NoSQL) database is applied to handle large volumes of unstructured HTTP requests captured every day. The method is tested with real HTTP traffic data collected through a proxy server of a private network, providing good results in the classification and detection of suspicious auto-ware web access.

QoS sensitive VANET Control Scheme based on Feedback Game Model

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1752-1767
    • /
    • 2015
  • As a special type of mobile ad-hoc network, Vehicular Ad-hoc Network (VANET) is considered as an attractive topic by many researchers. In VANETs, vehicles act as routers and clients, which are connected with each other through unreliable wireless links. Due to the dynamic nature of vehicles, developing communication protocols for VANETs is a challenging task. In this paper, we tackle the problem of real-world VANET operations and propose a new dual-level communication scheme through the combination of power and rate control algorithms. Based on the game theoretic approach, the proposed scheme effectively formulates the interactive situation among several vehicles. With a simulation study, it is confirmed that the proposed scheme can achieve better performance than other existing schemes under widely diverse VANET environments.

The Research for Cyber Security Experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1137-1142
    • /
    • 2017
  • Cyber hacking attacks and cyber terrorism are damaging to the lives of the people, and in the end, national security is threatened. Cyber-hacking attacks leaked nuclear power cooling system design drawings, cyber accidents such as hacking of Cheongwadae's homepage and hacking of KBS stations occurred. The Act on Information and Communication Infrastructure Protection, Promotion of Information and Communication Network Utilization and Information Protection, and the Personal Information Protection Act remove the responsibility for cyber attacks, but it is difficult to prevent attacks by hackers armed with new technologies. This paper studies the development of cyber security experts for cyber security. Build a Knowledge Data Base for cyber security professionals. Web hacking, System hacking, and Network hacking technologies and evaluation. Through researches on the operation and acquisition of cyber security expert certification, we hope to help nurture cyber security experts for national cyber security.

The Efficient Ship Wireless Sensor Network Using Drone (드론을 활용한 효율적인 선박 센서 네트워크)

  • Hong, Sung-Hwa;Kim, Byoung-Kug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.122-127
    • /
    • 2022
  • Currently, the drone is considered as a mobile base station of USN as a method to act as a base station using USN in existing LTE-M and LTE networks for data transmission in unmanned ships. Therefore, the drone, which is a mobile base station, is a sink node equipped with an LTE modem or a short-range communication modem, and can collect safety information of ship operation from the sensor node and transmit the safety information to the ship or transmit the information between the ships. As, if a short-range network is formed by using drones, it will form a communication network around unmanned ships and will be advantageous for collecting information using security and environmental sensors. In this paper, we propose a method to transmit environmental sensor data and to utilize communication between ships using drones to secure the surrounding information necessary for AI operation of unmanned ships in the future.

A Study on the Telecommunication Standardization Legal System in Korea (국내 정보통신 표준화 법체계 연구)

  • Sohn, Hong;Kim, Young-Tae;Kang, Boo-Mi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.74-80
    • /
    • 2000
  • In Korea we didn't have fundamental legal system on telecommunication until 'Communication Act'(Act No. 923) of Dec. 1961. After then, with rapid advances of technology and increases of request to telecommunication services in the field of telecommunication, circumstances around the telecommunication market have been changed. The market has been enlarged and slowed. Regulating of that field has been diverse and complex, Specially, as WTO went into effect, it's been recognized that standardization is more important for correspond to openness and liberalization in the field of telecommunication. In our country, national industry standardization began with 'Industry Standard Act of 1961', but it put mainly importance in manufacturing standard or industry standard till 1980's. Telecommunication standardization began to be active as TTA was set up in 1989. Now regulating rules to telecommunication standard are including 'the Fundamental Act of Information Promotion', 'Telecommunication Act', 'Act relating to Telecommunication Network Use Promotion, etc:, 'Software Industry Advancement Act','Knowledge Information Resource Act'. In this paper, we will survey regulating rules to telecommunication standard and Produce the future proposal to that.

  • PDF