• Title/Summary/Keyword: Private Interest

Search Result 400, Processing Time 0.027 seconds

Information inequality in commercialization of and information technology (정보 및 정보기술의 상업화에 따른 정보유통의 불균형)

  • 이순재
    • Journal of Korean Library and Information Science Society
    • /
    • v.19
    • /
    • pp.83-113
    • /
    • 1992
  • Information, or the lack of information, is the central concern of many people. And it is now an economic resource and must be paid. An ever increasing gap will grow between information 'have' and 'have not'. The new communications market place is a social phenomenon, and a vital key to examining changing patterns of social and cultural inequality. There are two main arenas of action in this ongoing conflict. Inside the library system itself, a combination of forces is weakening the historic principle of free, socially underwritten access. Outside, great efforts have been exerted in recent years, by private interests, to capture the information stockpiles built up from tax-su n.0, pported outlays on research and development and general governmental activities that produce data. The for-profit a n.0, pplication of the new information technologies threatens the survival of the free access principles. And the commercialization of information is proceeding almost uninterruptedly. It has been extended into areas that historically have been regarded as non-profit-making and endowed with a deep public interest. This study discussed some general issues and what we should do.

  • PDF

A study on the information protection to prepare for the change of EC environment (EC 환경변화에 대응하기 위한 정보보호에 관한 연구)

  • 신영균
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1691-1696
    • /
    • 2002
  • The major factors for the information protection to prepare for the change of the EC environment are found to be the construction of internet cyber-mall, the consumer-protecting regulations and the private information and system security regulations. The standards and methods of the their judgement is also important factors and are believed to attract the consumers' interest about the assessment of the internet cyber-mall and eventually serve the rights and interests of the consumers. The technology-level for the business transaction, the research and development of its technology and putting it into practical use are also found to be significant factors.

  • PDF

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

은행주식 소유제한에 관한 소고

  • Yu, Yun-Ha
    • KDI Journal of Economic Policy
    • /
    • v.23 no.1_2
    • /
    • pp.5-70
    • /
    • 2001
  • The often raised arguments against allowing Chaebol's ownership of banks, that is, 1) the banks may virtually be transformed into private cash vaults of owners, and 2) conflicts of interests may develop and be possibly abused by chaebols, do not hold under ordinary free market circumstances. Only under some special circumstances in which government imposes artificial regulations on banks such as interest rate ceilings, or provides preferential protection like guaranteeing bank's liabilities, the aforementioned worries can be materialized.

  • PDF

A Survey on the Effect for the Science Gifted Class of Gifted Student in Elementary (초등과학 영재 학생의 영재 학급에 대한 효과성 조사)

  • Choi, Sun-Young
    • Journal of Korean Elementary Science Education
    • /
    • v.27 no.4
    • /
    • pp.437-445
    • /
    • 2008
  • The purpose of this study was to examine about science gifted class student's effect of education for the science gifted class. For this, 21 item-questionnaires were given to 292 students at the 4th, 5th and 6th graders in 3 elementary gifted schools located in Incheon. The results of this study were as follows: First, science gifted students were positive in effect of gifted class. This was more positive as class is low. Second, gifted students are thinking that it is helped to own learning that study at gifted class in cognitive side but appeared relatively low regarding school record or utterance, study method, thinking faculty, creativity. Third, they did not think that is exerting a lot of effects about own habit that study, interest, pride in emotional side. Fourth, they thought that is effective in relation with new friends more than teachers and parents in sociocultural side. Fifth, in private tutoring side they thought that is not influencing to solve academy taking a course of decrease.

  • PDF

Hash Function Processor Using Resource Sharing for IPSec Chip

  • Kang, Young-Kyu;Kim, Dae-Won;Kwon, Taek-Won;Park, Jun-Rim
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.951-954
    • /
    • 2002
  • This paper presents the implementation of hash functions for IPSEC chip. There is an increasing interest in high-speed cryptographic accelerators for IPSec applications such as VPNs (virtual private networks). Because diverse algorithms are used in Internet, various hash algorithms are required for IPSec chip. Therefore, we implemented SHA-1, HAS-160 and MD5 in one chip. These hash algorithms are designed to reduce the number of gates. SHA-1 module is combined with HAS-160 module. As the result, the required logic elements are reduced by 27%. These hash algorithms have been implemented using Altera's EP20K1000EBC652-3 with PCI bus interface.

  • PDF

GCP(GROUND CONTROL POINT) FOR AUTOMATION OF THE HIGH RESOLUTION SATELLITE IMAGE REVISION

  • Jo, Myung-Hee;Jung, Yun-Jae
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.219-222
    • /
    • 2007
  • Today, use of high resolution satellite image with at least 1m resolution is expanding into many more areas including forest, river way, city, seashore and so forth for disaster prevention. Interest in this medium is increasing among the general public due to the roll-out to the private sector as Google earth, Virtual Earth and so forth. However, pre-processing process that revises the geometrical distortion that result at the time of photographing is required in order to use high resolution satellite image. The purpose of this research is to search the most accurate GCP(Ground Control Point) information acquisition method that is used for the revision of high resolution satellite image's geometrical distortion through automated processing. Through this, it is possible to contribute to increasing the level of accuracy at the time of high resolution satellite image revision and to secure promptness.

  • PDF

Publicity of Certification of Advanced Practice Nurse in Korea (전문간호사 자격인정의 공공성)

  • Kim, Ki-Kyong;Cho, Jae-Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.6 no.2
    • /
    • pp.291-310
    • /
    • 2005
  • Most of all countries have a governmental system for regulating the certification of nursing. In Korea, certification of advanced practice nurse(APN) is statuary regulation under supervision of government. In this article, the writers discuss the legal characters and effects of certification and regulatory body for certification and suggest the new regulatory system. The advanced practitioner may be recognize "new" health provider in the future. The nursing specialist have right to use title and practice expanded role. It's different things with physicians certification. The regulatory body is important because certification protected the title and empower APN authorize of expanded role. The certification of nursing is closely connected with public interest. The Korea government delegate power of national examination to private institute. To improve utility and publicity of certification system, we suggest that statutory empower the certification authority to public institute which composed with nursing professionals.

  • PDF

Comprehensive Security and Crisis & Emergency Management for Protecting Critical Infrastructure

  • Lee, Jae-Enn
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.71-78
    • /
    • 2009
  • Recently, interest has heightened over 'critical infrastructures' and their reliability in the face of potential terrorist attack. Assault on any of the critical infrastructures as transportation, power, water, telecommunications, and financial services, entails great consequences for their users as well as the other interdependent critical infrastructures. How to protect our vital critical infrastructures is the key question in this paper. The purpose of this article is to suggest the implications for crisis and emergency management to protect the critical infrastructures in our society. For achieving the purpose, we examined the concept of comprehensive security, national crisis, and critical infrastructure and, using the holistic approach, we examined the comprehensive emergency management for suggesting the implications for establishing the critical infrastructure protection system; building up the high reliability organization, organizing and partnering, assessing the risk, preparing first responders, working with private owners of critical infrastructures, working with communities, improving the administrative capacity.

A Railway Construction Efficiency Plan by Using Project Management Information System (프로젝트정보관리시스템을 활용한 철도공사 효율화 방안)

  • Lee, Tai-Sik;Park, Jang-Hee;Kim, Young-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.1532-1537
    • /
    • 2004
  • Downtown traffic culture of the car focus of our country have developed. But, it was been interested in railroad to saturation of situation, environmental problem. Also, it is getting interest which is international by departure point of network connecting from Europe to Northeast Asia. Private capital project of railroad is activated but Construction companies payability is real that is worsen day by day. Therefore, Construction companies is destroying element enterprise's inefficiency and the waste, be interested in Project Management Information System as part of information. I wish to approach in efficiency of railway construction by presenting professional construction company's Project Management Information System.

  • PDF