• Title/Summary/Keyword: Online protection

Search Result 257, Processing Time 0.026 seconds

Study of Registry Designing for the Hydrographic Data Standard Technology Operation (수로정보 표준기술 운용을 위한 등록소 설계 연구)

  • Kim, Ho-Yoon;Oh, Se-Woong;Shim, Woo-Sung;Suh, Sang-Hyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2012.06a
    • /
    • pp.87-88
    • /
    • 2012
  • The IHO developed the S-100 standard for Digital Hydrographic Data in order to assist the proper and efficient use of hydrographic data and information for the safety of navigation and the protection of marine environment. The former model, S-57, was considered outdated to be utilized as the basis for the next-generation Electronic Chart(ENC) product specification. The key feature of the S-100 standard is the use of Registry and its components, Registers. This online-based Registry provides a universal standard that can be implemented in the actual performance of the navigation system with convenience. In the current situation, the only registry is owned by the IHO and it is available to domain experts. However, since S-100 is an international standard operated by an international organization, the process of the changes and updates of the data requires time before immediate implementation when demanded. Therefore, regarding the safety of navigation of the domestic users and mariners, a separate domestic registry is necessary to develop a domestic Information Registry. This study specifically aims to build a Registry based on IHO published S-99 through designing an adequate website dedicated for its purpose to provide collection of definitions and hydrographic data.

  • PDF

Study on Preventing Copyrights Infringement through Blocking Advertisements of Illegal Copyrighted Websites (불법 저작물 사이트의 광고 차단을 통한 저작권 침해 방지 연구 - 자금 추적 기반 방식을 중심으로)

  • Shin, Myeong-Seob;Yong, Mi-Ran;Lee, Yeong-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.331-341
    • /
    • 2020
  • Recently the government has succeeded in shutting down the Illegal Copyrighted Websites by cracking down on the operators of the websites. But this only caused 'the Balloon Effect', similar websites were created and users shifted to the new websites. 'Follow the money' is drawing attention as a way to complement the effect of policies. It tracks the commercialization scheme and fund flows of the Illegal Copyrighted Websites and blocks the supply and publication of advertisements, which are the main source of revenue. This approach aims at self-closure of Illegal websites by blocking the revenue source. In this study, we have selected and analyzed overseas cases that adopted these measures. Many countries had different policies and campaigns, but three things are common: non-punishment measures, partnership based on voluntary participation, pursuing a variety of purposes other than protecting the copyright industry. In Korea, the reason public-private Partnerships was not properly established had been caused by the difference of views between them. Advertisers and agencies need to expand their awareness that illegal advertisements can have adverse effects such as brand image damage and enormous economic losses. Also campaigns and conferences related with the policy should be held to prevent copyright infringement through mutual understanding and cooperation.

Limitations and Challenges of Game Regulatory Law and Policy in Korea (현행 게임규제정책의 한계와 과제 : 합리적인 규제를 위한 고려사항)

  • Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.149-164
    • /
    • 2014
  • The laws and policies governing Korea's game regulations are becoming more and more topics for debate as we enter the Age of Internet. The nature of the basis for Internet regulations and policies are not rooted in freedom of speech or fundamental values of democracy, but rather focused on solving real-world problems such as protection of the youth. Furthermore, the reality is that regulatory devices for keeping the social order such as regulating gambling are being applied directly to games without consideration on the characteristics of Internet gaming, raising concerns that the expansion of constitutional values and innovative empowerment inherent to the Internet are being weakened. The Geun-Hye Park Administration which succeeded Myung-Bak Lee's Administration, even went so far as to implement the so-called "Shutdown Policy", which prohibits access to Internet games during pre-defined time zones and also instigated a time zone selection rule. In order to curb the gambling nature of Internet games, government-led policies such as the mandatory personal identification and prohibition of player selection or in other words mandatory random player selection are being implemented. These institutions can inhibit freedom of speech, which is the basis of democracy, violate the right of equality through unreasonable discrimination between domestic and foreign service providers, and infringe upon the principles of administrative law, such as laws, due process in policies, and balance in among policies and governmental bodies. Going forward, if Korea's Internet game regulations and polices is to develop in a rational manner, regulatory frameworks will need to be designed to protect the nature of the Internet and its innovative values that enable the realization of constitutional values; for example, the Internet acting as the "catalytic media for freedom of expression as a fundamental human right ", which has already been acknowledged by the Korea's Constitutional Court. At the same time, transparent procedures should be put into place that will allow diverse participation of stakeholders including game service providers, game users, the youth and parents in the legislation and enforcement process of regulatory institutions; policies will also need to be transformed to enable not only regulatory laws but also self-regulation system to be established. And in this process, scientific and empirical analysis on the expected effects before introducing regulations and the results of enforcing regulations after being introduced will need to be strengthened.

Literacture Review of Dental Infection Control in Korea(1988~2009) (치과 감염 관리에 관한 국내 문헌고찰(1988~2009년))

  • Choi, Ha-Na;Bae, Hyun-Sook;Cho, Young-Sik
    • Journal of dental hygiene science
    • /
    • v.10 no.4
    • /
    • pp.199-209
    • /
    • 2010
  • The purpose of this paper is to suggest fundamental data for finding problems and ways to improve Korean dental infection control studies through the classification of literature on dental infection control which have been conducted in Korea. The collection of literature was done via seven online database programs only for domestic literature. The date of first search was September 16-17th, 2009, and the final search was completed on December 20th, 2009. (1) From the examination of the frequency of research according to the publishing form by year, it is revealed that after 2006, dental infection control is being performed most vigorously, compared with 1980's when the studied on this area started. (2) According to the classification of research method by research design of original article among the literature, original articles were 45 studies, and the others were 20 studies. It was also found that in 45 studies of original article, there were 37 studies of survey research, and there were 8 studies which include microbiology examination. (3) On the analysis of the subject of each study, glob and mask using rate have gradually increased, and the frequency of pierced with sharp implement or needle have gradually decreased. Through this research, it can be observed roughly how the results depended on subject of each studies change. However, it may be restricted to generalize the results of this research, because there are lack of clear standard and literature evidence to assess the interrelationship between each study. Also, since there are shortage of research and studies in dental infection control, the research to examine the effects should be tried actively after the standards and precaution of dental infection control developed.

A Feasibility Study on the Aid and Abet of Providers of Revenue for Copyright Infringement - Focusing on Comparing with the US Cases - (온라인 저작권 침해 수익원 제공자인 광고의 책임에 대한 연구 - 미국 사례와의 비교를 중심으로 -)

  • Kim, Chang-Hwa
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.4
    • /
    • pp.1288-1308
    • /
    • 2017
  • When looking at the online copyright infringement, the advertisements have served as a revenue source. Recently, copyright holders and state agencies have requested to stop and withdraw posting the ad. in order to prevent copyright infringement. This way is very easy and efficient. However, the problem is that it is not clear whether the request is appropriate. For the request to be valid, posting the ad. should be a kind of indirect infringement, or if not, it must have a suitable reason. If there is no basis or reason for the two, the request should not be asked recklessly. In the US relevant cases, something more than simple relationship with direct infringers or more material contribution to the direct infringement is required to impose secondary liability for copyright infringement. However, just posting the ad. cannot be considered as the close relationship and moreover, it is not material contribution. Thus, posting the ad. is not secondarily liable for copyright infringement. In addition, the bills which was proposed in 2011, so called SOPA and PIPA, had a provision which can stop and withdraw the ads in the piracy sites. Its opponents raised the following problems: withdrawing the ad. is the censorship, gives the burdensome to the sites, and causes the imbalance due to the overload protection of copyright. Also, under the ad blocker case, to remove the ad. discretionally consists of illegal activity or copyright infringement. As a result, because the request to stop and withdraw posting the ad. is not reasonable, the request should be asked carefully.

A Study on the Privacy Awareness through Bigdata Analysis (빅데이터 분석을 통한 프라이버시 인식에 관한 연구)

  • Lee, Song-Yi;Kim, Sung-Won;Lee, Hwan-Soo
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.49-58
    • /
    • 2019
  • In the era of the 4th industrial revolution, the development of information technology brought various benefits, but it also increased social interest in privacy issues. As the possibility of personal privacy violation by big data increases, academic discussion about privacy management has begun to be active. While the traditional view of privacy has been defined at various levels as the basic human rights, most of the recent research trends are mainly concerned only with the information privacy of online privacy protection. This limited discussion can distort the theoretical concept and the actual perception, making the academic and social consensus of the concept of privacy more difficult. In this study, we analyze the privacy concept that is exposed on the internet based on 12,000 news data of the portal site for the past one year and compare the difference between the theoretical concept and the socially accepted concept. This empirical approach is expected to provide an understanding of the changing concept of privacy and a research direction for the conceptualization of privacy for current situations.

A Study on the Actual Use of Mobile Electronic Notification Service (모바일 전자고지서비스의 사용실태에 대한 조사 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.167-180
    • /
    • 2021
  • Due to the development of IT technology and the spread of infectious diseases, online non-face-to-face services are rapidly expanding. In particular, the information delivery process is also changing from the past postal branch-based to an information delivery system using mobile devices. This change is due to the change from the information delivery using the telephone line to the information delivery system using the Internet. Mobile notification service is a service that sends electronic notices to mobile devices held by users to deliver information and is validated for delivery, which has the advantage of reducing the benefits of unnecessary mail production, exposure to personal information, and misdelivery. However, user identification information must be provided to operators that provide mobile electronic notification services. In this paper, the current state of use of the mobile electronic notice service, which has been in effect since 2019, is investigated and analyzed, and the current mobile electronic notice service is to be safely provided and to take appropriate protection measures for personal information. In providing the mobile electronic notification service to users, it is possible to identify the service standards required by the sending agency, and based on this, prepare the technical standards for the mobile electronic notification service that the sending agency must comply with in advance and use it for the mobile electronic notification service.

A Study on the Usage of Investigation of Google Cloud Data (Smartphone user-oriented) (구글 클라우드 데이터의 수사활용 방안에 관한 연구 (스마트폰 사용자 중심))

  • Kim, Dongho;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.109-120
    • /
    • 2018
  • The smartphone is the communication device that is the most personal to the user, and it keeps a lot of information related to the user and makes information communication with other devices. With these characteristics, forensics on smartphones are one of the most basic methods of investigation in criminal investigations, and have actually contributed to the settlement of the case by providing many clues. However, recently, it is designed to encrypt data stored as a social issue related to the protection of user's personal information, or to delete deleted data or to delete log data together. So, any solutions? In this paper, I try to find the answer from cloud data stored by smartphone user account. Cloud forensics should approach complementary relationships rather than smartphone forensics. There are a lot of data stored in the cloud that can be meaningfully used in the investigation. Online activity information of users, such as Internet usage, YouTube view, and contents purchase information, cloud service such as e-mail, cloud drive, and location information are the most representative data. These data can be unvaluable, but here are some important clues in various types of criminal investigations. In this paper, I propose a method to extract data from the google cloud so that the data can be used for investigation, and to utilize the extracted data for investigation. And it explains the role of the extracted artifacts in the actual investigation business through virtual cases and proves its value.

A Study on Similar Trademark Search Model Using Convolutional Neural Networks (합성곱 신경망(Convolutional Neural Network)을 활용한 지능형 유사상표 검색 모형 개발)

  • Yoon, Jae-Woong;Lee, Suk-Jun;Song, Chil-Yong;Kim, Yeon-Sik;Jung, Mi-Young;Jeong, Sang-Il
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.55-80
    • /
    • 2019
  • Recently, many companies improving their management performance by building a powerful brand value which is recognized for trademark rights. However, as growing up the size of online commerce market, the infringement of trademark rights is increasing. According to various studies and reports, cases of foreign and domestic companies infringing on their trademark rights are increased. As the manpower and the cost required for the protection of trademark are enormous, small and medium enterprises(SMEs) could not conduct preliminary investigations to protect their trademark rights. Besides, due to the trademark image search service does not exist, many domestic companies have a problem that investigating huge amounts of trademarks manually when conducting preliminary investigations to protect their rights of trademark. Therefore, we develop an intelligent similar trademark search model to reduce the manpower and cost for preliminary investigation. To measure the performance of the model which is developed in this study, test data selected by intellectual property experts was used, and the performance of ResNet V1 101 was the highest. The significance of this study is as follows. The experimental results empirically demonstrate that the image classification algorithm shows high performance not only object recognition but also image retrieval. Since the model that developed in this study was learned through actual trademark image data, it is expected that it can be applied in the real industrial environment.

Requirement for Amendment of the Law on the Phrase 'Instruction of Physicians or Dentists' in Medical Service Technologist, etc Act (의료기사 등에 관한 법률에서 '의사 또는 치과의사의 지도' 문구에 대한 법률 개정 요구도)

  • Lim, Woo-Taek;Lim, Cheong-Hwan;Joo, Young-Cheol;Hong, Dong-Hee;Jung, Hong-Ryang;Kim, Eun-Hye;Yoon, Yong-Su;Jung, Young-Jin;Choi, Ji-Won
    • Journal of radiological science and technology
    • /
    • v.44 no.5
    • /
    • pp.503-512
    • /
    • 2021
  • The purpose of this study is to check the extent to which "instruction of physician or dentist" defined in the Medical Service Technologists, etc. Act is applied in relation to radiography examination procedures for radiological technologists. In addition, it is intended to present basic data on the requirement to revise the Medical Service Technologists, etc. Act in the radiological technologist's duty area and scope of work, The subjects of this study were radiological technologists with license, and the response data were collected after sending the questionnaire link written on the online questionnaire form. The final number of respondents were 1,018, and the response rate was 6.8%. Most of the negative responses were "I have never received 'instruction' for radiologic examination by a physician or dentist, including a radiologist in a medical environment." There were a high perception that "the professionalism in radiation examination on radiological technologists are higher than that of a physician or dentist." They answered that the current continuing education has a great impact on maintaining and continuing professionalism and learning new knowledge in the radiology field. In addition, the radiological technologists provide a very high level of education in areas related to radiography procedure ethics such as patient care, patient safety, and patient privacy protection, as well as specialized fields such as radiation-related examination methods, radiography examination dose, and patient exposure dose. Radiological technologists replied that they were receiving it consistently. In conclusion, in the current medical environment, the 'instruction' of a physician or dentist cannot be seen as being realistically performed. The phrase 'instruction' of a physician or dentist as defined in the Medical Service Technologists, etc. Act is considered inappropriate in respect of the fact that the state recognizes the qualifications of the medical service technologist through a license. It is thought that revision to a new term suitable for the current medical environment is necessary.