• Title/Summary/Keyword: Information disclosure

Search Result 631, Processing Time 0.03 seconds

The Present Status of and Development Plans for Legal Technology in the Fourth Industrial Revolution (4차 산업혁명시대 법정보기술의 현황과 발전방안)

  • Lee, Sung-Jin;Lee, Yeon-Ju;Son, Hyoung-Kun;Kim, Gi-Bum
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.3-21
    • /
    • 2021
  • Klaus Schwab's discussion on the Fourth Industrial Revolution provides a framework for predicting the direction of legal technology development. Technological convergence, which has emerged as the core concept of the Fourth Industrial Revolution has a significant effect on legal technology. In particular, various new technologies, such as legal chatbots and platforms, are being introduced to enhance efficiency and accessibility in the legal field. However, legal technology is still in its early stage, with institutional improvement needed to vitalize the industry. In this paper, we first specify the concept and classification of legal technology in Chapter 2, followed by trends and limitations in Chapter 3 and ways of vitalizing legal technology in the future in Chapter 4. To invigorate legal technology development, it is necessary to put in place legal regulatory measures that stipulate the active disclosure of legal data, such as precedents, and make free use of such measures. In the law, many issues, such as the safety of artificial intelligence, personal information protection, and ethical standards, will be discussed in the future. Therefore, via this paper, we hope to promote the formation of social consensus and prepare countermeasures, such as legislative measures.

Searching for Laws and Systems to Revitalize Private Archives (민간 아카이브 활성화를 위한 법·제도 모색)

  • Sohn, Dong You
    • The Korean Journal of Archival Studies
    • /
    • no.69
    • /
    • pp.7-33
    • /
    • 2021
  • From the beginning of the enactment and implementation of the Public Records Management Act, there has been a steady discussion on the establishment of local archives. Local archives include not only administrative records of local governments, but also private archives such as containing the lives of residents. Along with the academic discussion, there have been movements for local autonomy and decentralization. Currently, interest and discussion on private archiving are in the historical flow. In addition, private archiving has become a social concern because of the establishment of systems such as the Public Records Management Act and the Information Disclosure Act, the establishment of a digital environment, and the spread of the meaning and value of village community activities. There are several government agencies related to private archiving, and the grounds for performing their work are different, and there are many central administrative agencies to which they belong. Therefore, I propose that the National Archives take the lead and form a 'Consortium of Private archives Management Institutions'. The organization should promote first, cooperation of collection information and archives, second, coordination of tasks and functions between institutions, and third, establishment of a nationwide private archives management system. Now is our chance. Instead of reacting on an ad hoc basis, respond systematically with a long-term perspective.

A Study on the Operating Status of the Public Library Steering Committee (공공도서관 운영위원회 운영현황에 관한 연구)

  • Sim, Hyojung;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.3
    • /
    • pp.77-101
    • /
    • 2022
  • In this study, the current status of the public library steering committee, which is operated in accordance with Article 30 Paragraphs 2 and 3 of the Libraries Act, was examined and understood through a survey, and the direction of the promotion and policy for revitalizing the steering committee was sought moving forward. As a result of the analysis performed, the number of operations is once or twice a year, and the decisions of the steering committee meetings are reported to their supervisors, yet the reporting and disclosure of the meeting minutes are not mandatory in terms of regulations, etc., and while the importance was recognized, it turned out that the operation was carried out formally due to the lack of personnel in charge. The primary factors for revitalizing the operation were investigated as the structure of the committee, the responsibilities and authority of the committee, and the assignment of dedicated staff, etc. While there was a high perception that the enactment of a standard ordinance (proposal) was necessary, the concerns about the inhibition of autonomy were also mentioned, and hence, it is necessary to enact a standard ordinance(proposal) that sufficiently guarantees autonomy. To revitalize the steering committee, it is necessary to find various utilization and operational plans by considering holding regular meetings, supplementing systems and regulations that can reflect meeting decisions, establishing subcommittees, and assigning dedicated staff.

Review of change and response strategies for ESG management (ESG 경영을 위한 변화 및 대응 전략 검토)

  • Choe Yoowha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.75-79
    • /
    • 2023
  • ESG management means to thoroughly consider the investor's perspective when evaluating corporate value, and environmental, social, and governance issues are continuous and strategic monitoring issues in identifying risk and opportunity factors related to corporate management activities. In other words, the perspective of value creation is reflected in business relationships. The fundamental purpose of ESG management is continuous business value creation and thorough management of investment risks and business transactions in contractual relationships. It is also a requirement of linked investors. The field that Korean companies are currently experiencing the most is the recognition that 'ESG information collection is necessary and maintenance must be prioritized' in investor IR and global sales and marketing departments, and the primary need for this is emerging. In addition, as the legal affairs office, environmental safety department, and human resources department, which conduct compliance management, carry out related tasks, clarity at the organizational level must precede in order to properly establish an information integration and management system. It covers the scope of securing new market opportunities such as management, disclosure and communication. Therefore, in regard to the newly emerging ESG management and response methods, it is necessary to review and implement it repeatedly so that sustainable exchange profits can be created by simultaneously managing non-financial risks as well as efforts to enhance corporate value for financial returns.

A Study on Librarians' Perception about the Current Status and Establishment of Academic Library Development Plan (대학도서관 발전계획 현황과 수립에 관한 사서의 인식 조사)

  • Yong-Jae Lee;Sun-Gu Jeon;Jin-Gyeong Jeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.331-350
    • /
    • 2023
  • The purpose of this study is to investigate the academic librarians' perception of the current status and establishment of the development plans of domestic university libraries to suggest ways to increase usefulness of development plans. And this study sought ways to establish the academic library development plan that reflected the key components of the development plan. To this end, a survey was conducted on academic library librarians, and in-depth interviews were conducted with the persons in charge of the academic library development plan to supplement the limitations of survey. The results are as follows. First, the establishment of academic library development plans tend to be formal and passive, and has limitation in eliciting cooperation between external organizations and academic libraries. Second, most academic libraries do not disclose their development plans on their websites. Third, the awareness of the leaders of the academic library organization needs to be preceded, and a task force needs to be formed to establish development plan. As a result of the study, it is suggested that 'active changes in the perceptions and operation method within academic libraries', 'external disclosure of development plans and strengthening cooperation', and 'strengthening the initiative and role of librarians' are needed as improvement measures.

Investigating the Transfer Status and Improvement Strategies for Records from Defunct Elementary, Middle, and High Schools: After the Enactment of the Public Records Management Act (폐교(초·중·고)기록물 이관현황과 개선방안에 관한 연구: 공공기록물법 제정 이후)

  • Dasom Cheon;Jisue Lee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.4
    • /
    • pp.113-135
    • /
    • 2023
  • This study explores the transfer of defunct school records (by preservation period, type, and place of transfer) in South Korea since the Public Records Management Act was enacted in 1999 and suggests improvements. Metropolitan and provincial offices of education, totaling 17, were asked to disclose information about the status of defunct school records. Since 1999, 1,411 schools nationwide have closed permanently, predominantly elementary schools, followed by high then middle schools. By preservation period, there were more records in the 1 to 10-year category than in the 30-year to permanent category. By record type, most were electronic records, followed by paper records, archival objects, and audiovisual records. By place of transfer, most nonelectronic records were transferred to integrated schools, and most electronic records were transferred to the Records Management System. In-depth interviews with 10 record managers from local education offices found that the management of defunct school records varies widely by region and institution because of the lack of specified manuals. Participants also reported difficulties in transferring web-based records, archival objects, and audiovisual records, as well as insufficient archival space and computer systems. This study also provides suggestions to improve the management of defunct school records, such as establishing specified manuals, creating a dedicated government department for managing defunct school records, deploying workforces, and improving computer systems.

Analysis of the Status of Legal Deposit and Acquisition of Electronic Publications in Korea (국내 전자출판물의 납본·수집 현황 분석)

  • Gyuhwan Kim;Daekeun Jeong;Soojung Kim
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.4
    • /
    • pp.281-306
    • /
    • 2023
  • This study analyzed the legal deposit, acquisition, and donation status from 2020 to 2022, along with the deposit status of e-publications with issued ISBNs. Through this analysis, the study derived improvement measures to strengthen compliance with legal deposit obligations for domestic e-publications. The key findings are as follows: The collection methods were acquisition (57.07%), legal deposit (41.74%), and donation (1.19%). The file formats varied, including e-books (pdf, epub), webtoons (jpg), and audiobooks (mp3). Most e-publications collected were published from 2012 to 2022, with some from 1960 to 2011. Webtoons dominated acquired materials, while legal deposits mainly comprised e-books. Analyzing the status of e-publications with issued ISBNs, e-books (96.2%) were most common, with the literature field receiving the highest number of ISBNs. Most ISBNs were issued during 2020 to 2022. Looking at the top 10 publishers, the low legal deposit rate indicates the need for improvement. To address this, proposed improvement measures include enhancing publishers' awareness of legal deposits, strengthening incentives and sanctions, encouraging voluntary participation through transparent disclosure of the legal deposit status, and improving the accuracy of data in the ISBN issuance and deposit system.

Study on Open Access Transformative Agreement (오픈액세스 전환계약서 분석 연구)

  • Youngim Jung;Byoung-goon An
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.2
    • /
    • pp.267-291
    • /
    • 2024
  • Since the introduction of the OA transformative agreement as a new way of licensing electronic resources, the number of OA transformative agreements has continued to grow. Despite the wide range of content that should be included in the agreement due to the nature of the OA transformative agreement, there is a lack of research on OA transformative agreements. As a basis for developing a standard for OA transformative agreements, this study examines the current status of OA transformative agreements and analyzes the differences between two types of OA transformative agreements and the subscription contract. It was found that the number of OA transformative agreements has increased significantly worldwide, but the disclosure of OA transformative agreements has not been universalized. The overall structure of two different types of OA transformative agreements and a subscription contract is similar, but there are differences in the detailed clauses. In the OA transformative agreement, the detailed clauses related to the characteristic of the transformative agreement were newly created, or the details of the transformative agreement were added to the existing clauses of the subscription agreement. There were also some differences between the two types of agreements, identifying clauses that differed in content regardless of the OA transformative agreement. The study concluded that it is important to standardize the OA transformative agreement, as the number of different clauses between agreement types may increase the burden on librarians. This study is significant in that it provides a basis for the development of standardized agreements by examining the overall status of OA transformative agreements and analyzing actual agreements.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF