• Title/Summary/Keyword: Internet Regulation Laws

Search Result 17, Processing Time 0.024 seconds

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Influence The use of Smart phones on Duty Performance Capability (선박 당직 중 스마트폰 사용이 당직수행 능력에 미치는 영향)

  • Shin, Daewoon;Park, Youngsoo;Park, Jinsoo;Park, Sangwon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.100-102
    • /
    • 2015
  • In recent years, using a smart phone that can access the Internet becomes routine in society through development of information and communication technology. On land, as especially actual accidents and research results show risk that using the smart phone while driving at the same time, and there are traffic laws and regulations that restriction of using of smart phone. But the regulations on the use of smart phones at sea is incomplete state. On this paper. We invested present status of use and reality of smart phone at sea and analyzed the subjective risk for judging to apply to regulation. And we analyzed risk quantitatively by using the simulation experiment; it Suggested a direction of guideline for use of smart phone at sea.

  • PDF

A Regulatory Analysis on the Reverse Discrimination against Korean Domestic Businesses in relation to the Data Protection and Regulatory Improvement Orientation (개인정보 관련 국내기업의 역차별 상황에 관한 규제 분석과 개선방안에 관한 연구)

  • Lee, Inho;Kim, Seo-An
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.1-14
    • /
    • 2020
  • IT businesses in Korea have relatively strong regulations. While providing the same service, domestic businesses are in a situation of 'reverse discrimination of regulations' as they are less competitive than global IT companies in accordance with the application of the personal information protection legislation in Korea. In this paper, Personal Information Protection legislation was classified and laws of major countries were analyzed in comparative ways. It also compared and analyzed the "private policy" presented by representative Internet sites (Naver, Daum, Google, Facebook) that provide services to users in Korea. We also proposed three aspects of legislation improvement to address reverse discrimination.

Study of the Prior Review System about Medical Advertising on the Existing Laws

  • Kim, Woon-Shin;Joung, Soon-Hyoung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.97-106
    • /
    • 2016
  • This study tries to seek the is the realistic improvements and legislative measures about current medical advertising which was in the Court on 12 May 2015 by presenting and discussion the understanding, problems and its alternative direction of pre-deliberation on the existing law which is the decision on the constitutionality of health care advertising regulated health care advertising General commercial advertising has the right which have to be protected as the terms of the protection of know and freedom of expression and advertiser's there are sure to be in a value to be protected. Medical advertising is also a person in addition to the absolute value that includes both Due to the particularity of medical advertising in terms of life and the right to health Until now, this has been the target of strong regulations are changing the policy of gradual deregulation in our country, including the country. Medical advertising on the current medical law had been to be checked by pre-deliberation of the executive power. However, due to unconstitutional, in the circumstances which a false hype is flooding and increasing, it has been realized that the fair competition of medical community, life and health rights of the people are threatened by in reverse. In this regard, the abolition of the pre-deliberation system of medical advertising can be welcomed by abolition of the old system which is the legal and institutional censorship. Since its abolition, the alternative policy direction is insufficient also it is not clear. Therefore we need to study this. Therefore, in this paper, we try to find general theoretical background and problem of pre-deliberation system of medical advertising. Also, as trying to find feasibility or ambiguity of regulation and issues about medical advertising on medical law, we argued the provision of special measures of the medical advertising for introduction of integrated medical advertising deliberation committee which can ensure the independence and autonomy, strengthening of the monitoring on the internet advertising, legal resolving through amendments, strengthening of penalties, and establish special measures of medical advertising for the medical privatization and demand for the foreign medical tourist, etc. Empirical study about practical regulatory measures of medical advertising which converged the various opinions of consumer groups, government and academia, and medical community, and we expect hope to see the more realistic alternative provision.

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

Rent Seeking Analysis of IPTV Introduction Process in Korea (IPTV 도입 과정에 대한 지대추구론적 분석)

  • Jung, In-Soak
    • Korean journal of communication and information
    • /
    • v.47
    • /
    • pp.5-22
    • /
    • 2009
  • This study analysed the complicated introduction process of IPTV in Korea, based on the rent seeking theory which is one of an useful economic theory for explaining the dynamic interaction between government and entrepreneurs. Rent seeking theory describes the possibility of lobbying for economic regulations or regulatory capture which refers to collusion between firms and the government agencies assigned to regulate them. The introduction of IPTV(Internet Protocol TV) in Korea was the most controversial policy issue since the beginning of new media business of cable TV in 1995. In addition to the ordinary conflict between the old and new entrepreneurs, IPTV caused the bureaucratic conflicts between the Ministry of Information and Communication and the Korean Broadcasting Commission (Two regulation agencies were merged into KCC(Korean Communications Commission) in 2008). Through the process all related policy players, including the government, pursued their own rent, and it caused vicious circle of continuous rent seeking and mutual distrust among players. Finally, all-directional lobby of pre-IPTV companies brought about the successful entrance to IPTV market and the enactment of IPTV special law which includes deregulation compared to the existing Broadcast Act. Considering the convergence trend of media related laws it means going against the times. Until now, the conflict phenomena occurring in broadcast industry were mostly explained based on the sociological conflict theory. However, the result of this study shows the usefulness and necessity of rent seeking theory because it gives an economic explanation of conflict behavior.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF