• Title/Summary/Keyword: Information and Communication Network Act

Search Result 71, Processing Time 0.029 seconds

A Study on The Problems of Spam mail and Efficient Countermeasure (스팸메일의 문제점과 효율적 대응방안에 관한 연구)

  • Han, Sang-Am;Kim, Jyoung-Gyu
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.337-341
    • /
    • 2006
  • Spam email is an electronic mail sent to a large number of netizen who do not want it. Criminals have been to take an advantage of this tool easily through harmful activities such as phishing. Recently the spam mail containing commercial information is broadly accepted as an illegal commitment to endangering the network. According some report, it could cause real damages. For the better policy on controlling spam mail we need new Efficient Countermeasure. Several laws have been enacted in Korea for controlling spam mail. The most important acts is the Using and Protecting Communication Act. Main targets of this law is virus spreading, computer hacking, cyber pornography, intellectual property breaching, private or public information abusing and cyber terrorism. But the Using and Protecting Communication Act is insufficient to control spam mail. For the better policy on controlling spam mail we need new Efficient Countermeasure. Therefore, this research wishes to present way to control for efficient spam mail through enactment of conversion, induction of clash action system degree, special law of national regulation form for spam mail.

  • PDF

TWR based Cooperative Localization of Multiple Mobile Robots for Search and Rescue Application (재난 구조용 다중 로봇을 위한 GNSS 음영지역에서의 TWR 기반 협업 측위 기술)

  • Lee, Chang-Eun;Sung, Tae-Kyung
    • The Journal of Korea Robotics Society
    • /
    • v.11 no.3
    • /
    • pp.127-132
    • /
    • 2016
  • For a practical mobile robot team such as carrying out a search and rescue mission in a disaster area, the localization have to be guaranteed even in an environment where the network infrastructure is destroyed or a global positioning system (GPS) is unavailable. The proposed architecture supports localizing robots seamlessly by finding their relative locations while moving from a global outdoor environment to a local indoor position. The proposed schemes use a cooperative positioning system (CPS) based on the two-way ranging (TWR) technique. In the proposed TWR-based CPS, each non-localized mobile robot act as tag, and finds its position using bilateral range measurements of all localized mobile robots. The localized mobile robots act as anchors, and support the localization of mobile robots in the GPS-shadow region such as an indoor environment. As a tag localizes its position with anchors, the position error of the anchor propagates to the tag, and the position error of the tag accumulates the position errors of the anchor. To minimize the effect of error propagation, this paper suggests the new scheme of full-mesh based CPS for improving the position accuracy. The proposed schemes assuring localization were validated through experiment results.

Trust based Mutual Authentication Mechanism for Cloud Computing

  • Mandeeep Kaur;Prachi Garg
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.81-90
    • /
    • 2023
  • Cloud computing is an emerging business model popularized during the last few years by the IT industry. Providing "Everything as a Service" has shifted many organizations to choose cloud-based services. However, some companies still fear shifting their data to the cloud due to issues related to the security and privacy. The paper suggests a novel Trust based Mutual Authentication Mechanism using Secret P-box based Mutual Authentication Mechanism (TbMAM-SPb) on the criticality of information. It uses a particular passcodes from one of the secret P-box to act as challenge to one party. The response is another passcode from other P-box. The mechanism is designed in a way that the response given by a party to a challenge is itself a new challenge for the other party. Access to data is provided after ensuring certain number of correct challenge-responses. The complexity can be dynamically updated on basis of criticality of the information and trust factor between the two parties. The communication is encrypted and time-stamped to avoid interceptions and reuse. Overall, it is good authentication mechanism without the use of expensive devices and participation of a trusted third party.

Analysis of Improved Convergence and Energy Efficiency on Detecting Node Selection Problem by Using Parallel Genetic Algorithm (병렬유전자알고리즘을 이용한 탐지노드 선정문제의 에너지 효율성과 수렴성 향상에 관한 해석)

  • Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.953-959
    • /
    • 2012
  • There are a number of idle nodes in sensor networks, these can act as detector nodes for anomaly detection in the network. For detecting node selection problem modeled as optimization equation, the conventional method using centralized genetic algorithm was evaluated. In this paper, a method to improve the convergence of the optimal value, while improving energy efficiency as a method of considering the characteristics of the network topology using parallel genetic algorithm is proposed. Through simulation, the proposed method compared with the conventional approaches to the convergence of the optimal value was improved and was found to be energy efficient.

Simulation Analysis of Network Load of Application Level Security Protocol for Smart grid (시뮬레이션을 이용한 스마트 그리드 통신망 상의 응용 계층 보안 프로토콜의 부하 분석)

  • Lee, Kwang-Sik;Han, Seung-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.17-24
    • /
    • 2015
  • Smart grid is a modernized electrical grid that uses information and communication technologies to gather and act on information, such as information about the behaviors of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. However, with the advent of cyber crime, there are also concerns on the security of the infrastructure, primarily that involving communications technologies. In this work, we make an in-depth investigation on the issue of security services and network loads on Smart grid. Through simulation, we analyze the relations between security services and network loads. The experimental results of this study will contribute toward designing an advanced Smart grid system that offers better quality of services. Also, the approach proposed in this study can be utilized to derive new and valuable insights in security aspects.

The Right To Be Forgotten and the Right To Delete News Articles A Critical Examination on the Proposed Revision of The Press Arbitration Act (기사 삭제 청구권 신설의 타당성 검토 잊힐 권리를 중심으로)

  • Mun, So Young;Kim, Minjeong
    • Korean journal of communication and information
    • /
    • v.76
    • /
    • pp.151-182
    • /
    • 2016
  • The right to be forgotten (RTBF) has been a population notion to address privacy issues associated with the digitalization of information and the dissemination of such information over the global digital network. In May 2014, the European Court of Justice (ECJ) laid down a landmark RTBF decision to grant individuals the right to be de-listed from search results. ECJ's RTBF decision sparked an increased interest in RTBF in South Korea. Academic and non-academic commentators have provided a mistaken or outstretched interpretation of RTBF in claiming that removal of news articles should be read into RTBF in Korean law. Moreover, the Press Arbitration Commission of Korea (PAC) has proposed revising the Press Arbitration Act (PAA) to allow the alleged victims of news reporting to request the deletion of news stories. This article examines the notion of RTBF from its origin to the latest development abroad and also critically explores Korean laws regulation freedom of expression to evaluate if Korea needs the proposed PAA revision.

  • PDF

Realtime Mobile Base Station Placement with EM Algorithm for HAP based Network (HAP 기반 네트워크에서의 EM 알고리즘을 사용한 실시간 이동 기지국 배치)

  • Jung, Woong-Hee;Song, Ha-Yoon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.181-189
    • /
    • 2010
  • HAP(High Altitude Platform) is a stationary aerial platform positioned in the stratosphere between 17Km and 22Km height and it could act as an MBS (Mobile Base Station). HAP based Network has advantages of both satellite system and terrestrial communication system. In this paper we study the deploy of multiple HAP MBS that can provides efficient communication for users. For this study, EM(Expectation Maximization) clustering algorithm is used to cluster terrestrial mobile nodes. The object of this paper is improving EM algorithm into the clustering algorithm for efficiency in variety aspects considering distance between mobile terminal units and speed of mobile terminal units, and estimating performance of HAP MBS deploy technique with use of improved EM algorithm using RWP (Random Waypoint) node mobility.

The Impact of CPO Characteristics on Organizational Privacy Performance (개인정보보호책임자의 특성이 개인정보보호 성과에 미치는 영향)

  • Wee, Jiyoung;Jang, Jaeyoung;Kim, Beomsoo
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.93-112
    • /
    • 2014
  • As personal data breach reared up as a problem domestically and globally, organizations appointing chief privacy officers (CPOs) are increasing. Related Korean laws, 'Personal Data Protection Act' and 'the Act on Promotion of Information and Communication Network Utilization and Information Protection, etc.' require personal data processing organizations to appoint CPOs. Research on the characteristics and role of CPO is called for because of the importance of CPO being emphasized. There are many researches on top management's role and their impact on organizational performance using the Upper Echelon theory. This study investigates what influence the characteristics of CPO gives on the organizational privacy performance. CPO's definition varies depending on industry, organization size, required responsibility and power. This study defines CPO as 'a person who takes responsibility for all the duties on handling the organization's privacy,' This research assumes that CPO characteristics such as role, personality and background knowledge have an influence on the organizational privacy performance. This study applies the part relevant to the upper echelon's characteristics and performance of the executives (CEOs, CIOs etc.) for CPO. First, following Mintzberg and other managerial role classification, information, strategic, and diplomacy roles are defined as the role of CPO. Second, the "Big Five" taxonomy on individual's personality was suggested in 1990. Among these five personalities, extraversion and conscientiousness are drawn as the personality characteristics of CPO. Third, advance study suggests complex knowledge of technology, law and business is necessary for CPO. Technical, legal, and business background knowledge are drawn as the background knowledge of CPO. To test this model empirically, 120 samples of data collected from CPOs of domestic organizations are used. Factor analysis is carried out and convergent validity and discriminant validity were verified using SPSS and Smart PLS, and the causal relationships between the CPO's role, personality, background knowledge and the organizational privacy performance are analyzed as well. The result of the analysis shows that CPO's diplomacy role and strategic role have significant impacts on organizational privacy performance. This reveals that CPO's active communication with other organizations is needed. Differentiated privacy policy or strategy of organizations is also important. Legal background knowledge and technical background knowledge were also found to be significant determinants to organizational privacy performance. In addition, CPOs conscientiousness has a positive impact on organizational privacy performance. The practical implication of this study is as follows: First, the research can be a yardstick for judgment when companies select CPOs and vest authority in them. Second, not only companies but also CPOs can judge what ability they should concentrate on for development of their career relevant to their job through results of this research. Cultural social value, citizen's consensus on the right to privacy, expected CPO's role will change in process of time. In future study, long-term time-series analysis based research can reveal these changes and can also offer practical implications for government and private organization's policy making on information privacy.

A Study on "the other person" in Act on promotion of information and communications network utilization and information (정보통신망 이용촉진 및 정보보호 등에 관한 법률상의 "타인"에 관한 고찰)

  • Kim, Hye-Rim;Park, Kwang-Hyun;Park, Jong-Ryoel
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.173-175
    • /
    • 2013
  • 본 논문에서는 정보통신망 이용촉진 및 정보보호 등의 관한 법률에서 '타인'의 범위에 관한 해석을 논점으로 삼고 있다. 대법원은 위 법 제49조의 '타인'의 범위에 관한 해석에서 생존한 사람뿐만 아니라 사망한 자도 포함하여 해석하고 있다. 물론 동법의 사자(死者)도 정보통신망의 안정성과 정보의 신뢰성 확보를 위해 포섭하여 해석할 수 있다는 견해가 존재할 수 있지만 형법 및 형사특별법은 죄형법정주의라는 이념상 허용될 수 없다는 견해가 타당하다. 형사법의 해석은 형벌이라는 가혹한 법률효과를 예정하고 있으므로 형벌법규의 해석은 엄격해야 하고 명문규정의 의미를 피고인에게 불리한 방향으로 확장해석하거나 유추해석을 해서는 안된다. 만약 동법 제49조의 '타인'의 범위에 사자(死者)를 포함한다면 법률해석의 방법인 문리해석, 논리해석, 목적론적 해석, 헌법 합치적 해석에도 반하므로 동법에서 '타인'의 범위에 사자(死者)를 포함시키고자 한다면 동법의 개정을 통해 법규 수범자에게 예측가능성을 확보할 수 있도록 용어의 분명한 정의규정이 입법을 통해 반영되어야 한다.

  • PDF

External Optical Modulator Using a Low-cost Fabry-Perot LD for Multicasting in a WDM-PON

  • Lee, Hyuek-Jae
    • Journal of the Optical Society of Korea
    • /
    • v.15 no.3
    • /
    • pp.227-231
    • /
    • 2011
  • An external optical modulation using absorption s in a Fabry-Perot laser diode (FP-LD), has been proposed and experimentally demonstrated for multicasting in a WDM-PON. The center wavelengths of absorption s in an FP-LD move to short-wavelength rapidly by only a small current (~1 mA) injection. If the current injection is stopped, the s move back to the original position. Such a movement of the s can make the FP-LD act as an external optical modulator, which is found to modulate at a maximum modulation speed of 800 Mbps or more. For a multicasting transmitter in a WDM-PON, the proposed modulator can be cost-effectively applied to a multi-wavelength laser source with the same periodicity of the longitudinal mode. Instead of the multi-wavelength laser source, tunable-LDs are used for experiments. The 32 channel multicasting system with the proposed modulator has been demonstrated, showing power penalties of 1.53~4.15 dB at a bit error rate of $10^{-9}$ with extinction ratios better than 14.5 dB at 622 Mbps.