• Title/Summary/Keyword: Internet Policy

Search Result 1,628, Processing Time 0.027 seconds

The Effect of Parenting Attitudes on Writing Vicious Internet Replies and the Viewing of Internet Pornography: With a Focus on Gender Differences (부모양육태도가 청소년의 악성댓글작성과 음란사이트열람에 미치는 영향: 성별차이를 중심으로)

  • Park, Na Rae;Oh, Su Kyung;Jin, Mi Seon;Baek, Su Jeong;Chung, Ick-Joong
    • Korean Journal of Child Studies
    • /
    • v.36 no.2
    • /
    • pp.39-54
    • /
    • 2015
  • The purpose of this study was to examine the impact of parenting attitudes on writing vicious internet replies and the viewing of internet pornography. This study utilized logistic and multiple regression analyses of the 5th wave(2nd grade in middle school) data from the Korean Youth Panel Study(KYPS), as administered by the National Youth Policy Institute. The results of this study can be summarized as follows: First, parenting attitudes were found to decrease the writing of vicious internet replies and the viewing of internet pornography. Second, there was a significant gender difference in the effect of parenting attitudes. As for male adolescents, parental monitoring was more important in the decrease in writing vicious internet replies and the viewing of internet pornography than parental attachment. In contrast, for female adolescents, parental attachment was more important in decreasing the viewing of internet pornography than parental monitoring. On the basis of these results, several implications for youth welfare practice and policy were suggested.

Telecommunications Infrastructures and Services Development and Challenges in Nepal

  • Shrestha, Surendra;Adhikari, Dilli Ram
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.27-36
    • /
    • 2017
  • The world's unique geographical, multilingual, multiethnic, multiracial and multi religious Himalayan country Nepal has more than 100 years history on telephony service and it has been formulating appropriate policy and regulation for the adoption of new technology, introducing the competitive market environment for the overall development of Information and Communication Technology (ICT) infrastructures and application of ICT service and tools for socio-economic transformation. The Nepalese market seems to be continuously growing and having huge demand of mobile telephony and internet subscriptions trend. The ICT infrastructure development in difficult geographical area is quite challenging and thus operators are focusing mobile telephony and mobile internet services. Nepal has been doing its best effort on formulating policy and regulation, adoption key strategies for ICT sector development and at the same time joining hands with international and regional bodies such as ITU, SAARC etc for ICT sector development. Due to geographical diversity, policy and regulatory barriers in some extent, power supply constraints and low affordability from customers on ICT tools and services, Nepal has been facing challenges on ICT infrastructure development. However, the national statistics on ICT, Networked Readiness Index and ICT Development Index show that Nepal has done quite good progress and is keeping its pace on ICT development despite the these challenges. Moreover, there seems to be quite uncovered market segments on internet service and big opportunity on ICT sector development in Nepal in the days to come.

The study on factors affecting committing behavior school violence according to the degree of Internet addiction (인터넷중독정도에 따른 학교폭력가해행동에 영향을 미치는 요인에 관한 연구)

  • Jung, Yun-Tae;Oh, Jung-A;Lee, Young-Joo
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.77-86
    • /
    • 2012
  • The significances of this study are that it offers the possibility of empirical measure, and analysis of the relevance among the temperament according to the degree of Internet addiction, parental rearing behaviors, and committing school violence and that, based on this, were drawn policy suggestions to prevent school violence according to the degree of Internet addiction. According to the results of this study it was revealed that there are differences in Internet addiction depending on the demographical and sociological characteristics. The result of investigating the impact of Internet addiction's degree on the actions of committing school violence shows that the level of general activities is high in the group of young people of Internet addiction and addiction risk, their low access/withdrawal temperament and mood temperament affect significantly the actions of committing school violence, and in parenting behavior mother's high expectations and low supervision affect youth Internet addiction and school violence. Thus, policy suggestions to prevent school violence according to Internet addiction were presented y dividing the role of government and schools, and homes.

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF

A Study on the i-PIN Policy Implementation Process for the i-PIN Revitalization (i-PIN의 활성화를 위한 정책집행 과정 분석)

  • Kim, Min Chen;Song, Keun Won;Chung, Choong Sik
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.43-62
    • /
    • 2010
  • Mandatory use of resident registration number in Korean websites is likely to result in an violation of privacy. The Korea government introduced i-PIN (Internet Personal Identification Number) to solve this problem in Oct of 2006. But the implementation of i-PIN has failed to decrease violation of privacy. Therefore, we must open our eyes to problems of i-PIN and the importance of privacy protection. This study analyzes the policy failures of i-PIN and considers countermeasures for protecting privacy on the Internet, and explores policy alternatives to secure privacy on the Internet by analyzing the implementation process of I-PIN. In conclusion, this study stresses the urgent need for a well-thought-out policy in order to solve the problems of i-PIN on the Internet. It expects that the i-PIN will make a big stride for the realization of secure electronic government.

  • PDF

The consumer policies for the electronic transaction (선진국의 전자거래 소비자정책)

  • Park, Ho-Yong
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.57-76
    • /
    • 2002
  • This paper surveys consumer policies for the internet transaction in the developed countries. Recently the internet transaction has been witnessing a remarkable change represented by the rapid spread of "revolution of distribution". It cannot be, however, stated that internet transaction will dominates all the market places without enhancing consumer's reliability in the internet transaction. Many countries made an efforts to the consumer protection in order to develop infra-structure of information industry. We will soon discover a new paradigm that consumer protection is not a tool for development of cyber market but the goal itself. We survey the process of consumer policies discussed in the developed countries and study the point of prevailing arguments of the consumer protection in the internet transaction. The arguments discussed in OECD meetings are debatable, especially, to the degree of government intervention in the field of consumer protection between EU and US. In contrast of US insisted on the minimum intervention of the government, EU suggest the opinion of more aggressive role of government in consumer policy in the cyber market. This paper attempts to provide several guide lines of Korean consumer policy in the cyber market.

  • PDF

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

  • Li, Jiguo;Wang, Haiping;Zhang, Yichen;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3339-3352
    • /
    • 2016
  • In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is associated with a set of attributes, and the ciphertext is associated with an access policy. The user can decrypt the ciphertext if and only if the attribute set of his secret key satisfies the access policy specified in the ciphertext. In the present schemes, access policy is sent to the decryptor along with the ciphertext, which means that the privacy of the encryptor is revealed. In order to solve such problem, we propose a CP-ABE scheme with hidden access policy, which is able to preserve the privacy of the encryptor and decryptor. And what's more in the present schemes, the users need to do excessive calculation for decryption to check whether their attributes match the access policy specified in the ciphertext or not, which makes the users do useless computation if the attributes don't match the hidden access policy. In order to solve efficiency issue, our scheme adds a testing phase to avoid the unnecessary operation above before decryption. The computation cost for the testing phase is much less than the decryption computation so that the efficiency in our scheme is improved. Meanwhile, our new scheme is proved to be selectively secure against chosen-plaintext attack under DDH assumption.

Multi-path Routing Policy for Content Distribution in Content Network

  • Yang, Lei;Tang, Chaowei;Wang, Heng;Tang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2379-2397
    • /
    • 2017
  • Content distribution technology, which routes content to the cache servers, is considered as an effective method to reduce the response time of the user requests. However, due to the exponential increases of content traffic, traditional content routing methods suffer from high delay and consequent inefficient delivery. In this paper, a content selection policy is proposed, which combines the histories of cache hit and cache hit rate to collaboratively determine the content popularity. Specifically, the CGM policy promotes the probability of possible superior paths considering the storage cost and transmission cost of content network. Then, the content routing table is updated with the proportion of the distribution on the paths. Extensive simulation results show that our proposed scheme improves the content routing and outperforms existing routing schemes in terms of Internet traffic and access latency.

A Design and Implementation of Policy-based QoS Resource Management System (정책기반 자원관리 시스템의 설계 및 구현)

  • Jung, Yoon-Hee;Choi, Tae-Sang;Jung, Tae-Su
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.1084-1088
    • /
    • 2000
  • 현재 인터넷에서 QoS(Quality of Service )를 보장하기 위해 다양한 메커니즘이 제안되고 있다. 통신망에서 QoS를 지원하기 위해서는 해당 응용 서비스마다 적절한 자원을 할당하고 자원 사용을 모니터링 및 제어하며, 이례적인 사건이 발생하였을 경우 자원을 재할당할 수 있도록 지원하는 자원관리 기능이 요구된다. 본 논문에서는 차등서비스를 제공하는 인터넷에서 QoS를 제공하기 위해 망자원을 관리 및 제어하는 정책기반 자원관리시스템의 설계 및 구현에 대해 기술한다. 정책기반 자원관리 시스템은 도메인 내의 사용자나 망 관리자로부터 QoS 요구를 받으면 도메인 내의 자원사용량과 자원사용정책에 따라서 내부자원을 할당하고, 이웃도메인과는 QoS가 보장되도록 SLA(Service Level Agreement)를 체결하는 기능을 수행한다. 구현한 정책기반 자원관리시스템은 정책정보를 PIB(Policy Information Base)의 형태로 정책 데이터베이스에 저장하며, 정책서버와 정책 클라이언트 사이에는COPS(Common Open Policy Service)프로토콜을 사용하여 정책 정보를 송수신함을 특징으로 한다.

  • PDF

Internet Governance in the light of Human Rights (인권적 관점에서 본 인터넷 거버넌스)

  • Park, Seong Hoon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.52-57
    • /
    • 2013
  • Information and Communication Technologies(ICTs) have substantially enlarged both the opportunities to realize one's human rights but have also resulted in the emergence of new challenges. ICTs are so deeply embedded and cental to almost all aspects of human activity. And ICTs are assuming an increasingly central role in all aspects of human and societal development across the world. But this is especially true of the right to privacy, which faces challenges such as profiling and data mining for public(including national security) and private purposes. ICTs access is a fundamental right for all humans in the information age. So we have need for regulation based on human rights in the digital age. And governments have a responsibility to protect individuals against violations of human rights and data protection by public authorities, but also by private entities. In addition, internet governance and multi-stakeholder principle have to be stressed on all of the internet issues because internet governance is included in the principle of democracy which have bottom-up communication and equality. So it is very importance that Internet Governance Forum is the space for a meaningful discussion on public policy issues relating to the internet.

  • PDF