• Title/Summary/Keyword: Right to Access

Search Result 324, Processing Time 0.033 seconds

A Study on the System of Confidential Record Management of the USA (미국의 비밀기록관리제도에 관한 연구 -대통령의 행정명령(EO)을 중심으로-)

  • Kim, Geun Tae
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.159-206
    • /
    • 2019
  • This study aims to analyze the details of the executive order of the president of the United States, which have been developed in the country's administrative system to institutionalize the guarantee of the people's right to know the classified records, as well as to protecting national secrets. This study also aims to present any implications for the development of the classified record management system of Korea. To this end, the previously issued EO concerning the classified records management were reviewed in terms of its classification, safeguard, and declassification. The analysis results showed that the EO by the president established and prescribed the special access program for national secrets, the system to exempt and suspend the automatic declassification, and the sanctions for protecting national secrets. The EO also established and prescribed the appointment system for the person with the authority to classify record, automatic declassification program, and Mandatory declassification review system, as well as the procedures for historical researcher and certain former government personal to access the classified records with the purpose of guaranteeing people's right to know. As a result, this study identified implications for the development of Korea's classified record management system, as follows : First, it is necessary to restructure the current classified record management system, by changing the operations that is dependent on the director of the National Intelligence Service to the one that is dependent on the President. Second, it is necessary to legislate a separate special law for the classified record management system. Third, a standing supervisory body should be established for the integrated management and for the consistent and routine supervision of the classified record management. Fourth, it is necessary to establish procedures to further review the classification of classified record to correct the defects of the current classification system, which has been abused and mismanaged by the national agencies and organizations that produce classified record.

The Impact of Outsourcing Strategy on a Firm's Innovation and Internationalization

  • SAMSON, Kouame Kouakou;LEE, Youngwoo
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.7 no.4
    • /
    • pp.1-13
    • /
    • 2019
  • Purpose - Based on transaction cost perspective and institution-based perspective, this research attempts to investigate the effect of outsourcing on a firm's performance and how it interacts with institutional context in which the firms operate. Research design, data, and methodology -With a sample of 164 manufacturing firms form South Korea, we examine the direct effects of outsourcing on the a firm's level of product innovation and internationalization and the moderating effects of competitive pressure and property right protection as important external factors that could affect the effectiveness of outsourcing decision. Result - The findings show that outsourcing not only enhance a firm's capability to concentrate on its core competencies, but also to increase a firm's combinative capacity to acquire external knowledge. Furthermore, we finds that in a highly competitive environment, potential knowledge spillovers to other competitors may attenuate the potential benefits of outsourcing. Conclusion - Outsourcing can enhance a firm's innovation activities by providing valuable access to external knowledge and also to complementary resources from the external partners, which in turn enables firms to focus on core competences.

Internet Governance in the light of Human Rights (인권적 관점에서 본 인터넷 거버넌스)

  • Park, Seong Hoon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.52-57
    • /
    • 2013
  • Information and Communication Technologies(ICTs) have substantially enlarged both the opportunities to realize one's human rights but have also resulted in the emergence of new challenges. ICTs are so deeply embedded and cental to almost all aspects of human activity. And ICTs are assuming an increasingly central role in all aspects of human and societal development across the world. But this is especially true of the right to privacy, which faces challenges such as profiling and data mining for public(including national security) and private purposes. ICTs access is a fundamental right for all humans in the information age. So we have need for regulation based on human rights in the digital age. And governments have a responsibility to protect individuals against violations of human rights and data protection by public authorities, but also by private entities. In addition, internet governance and multi-stakeholder principle have to be stressed on all of the internet issues because internet governance is included in the principle of democracy which have bottom-up communication and equality. So it is very importance that Internet Governance Forum is the space for a meaningful discussion on public policy issues relating to the internet.

  • PDF

A Study on the Regulation of Dental Medical Advertisements -Focusing on the Decisions of the Supreme Court and the Constitutional Court- (치과 의료광고 규제에 관한 소고 - 대법원 판결과 헌법재판소 결정을 중심으로 -)

  • Chang, Yeonhwa;Baek, Kyonghee
    • The Journal of the Korean dental association
    • /
    • v.55 no.1
    • /
    • pp.53-62
    • /
    • 2017
  • As the citizens' life and body are the object of medical practice, it should ultimately protect the citizens' right of health. For this reason, medical practice possesses characteristics of non-profit and public and such special characteristics caused heavy regulations in the medical industry as exemplified by medical advertisements. For advancement of market economy, the government has been moving toward relaxing regulations in the medical industry and this trend can be shown in medical advertisements. Moreover, as a type of commercial advertisements, medical practitioners should be able to express their freedom of expression and freedom to occupation. From the perspective of patients who are medical consumers, they need access to information to locate appropriate medical practitioners and institutions for their symptoms. Therefore, medical advertisements can help realize the patients' right to know. This study will first analyze the general theories behind the necessity of medical advertisements and details of regulations, then analyze the issues from the cases of the supreme court and the constitutional court that are related to dental medical advertisements.

  • PDF

A Study on the Characteristics and the Types of Encirclement Space applied to the Women's Hospital in the City (도심 여성전문병원에 적용된 위요공간의 특징과 개념에 관한 연구)

  • Kim, Kyu-Sung
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.11 no.3
    • /
    • pp.75-85
    • /
    • 2005
  • Recently the number of women's hospitals of a small scale are increasing in seoul and the other cities although the surroundings of these sites are so inferior. Those hospitals need the space of comfort as like family home. This study suggests that the encirclement space is one of the design methods to make comfort to patients. The encirclement is the form of hugging a baby to a mother's arms. Analysing six woman hospitals, encirclement space is categorized about the six types of square, open square, right-angled, linear, dispersed, etc. The characteristics of "right-angled" is featured as the form of L, and "square" type is characterized as the relationship of functional circulation among doctors, nurses and patients. And all types are organized as the relationship between the encirclement space and the enclosed space about how the functional space and the comfort space are made up. The properties of encirclement space are appeared by the interactions about function, circulation, sight, form, access, recognition through transparent, three-dimensional experience, etc. Encirclement space is recommended as a vital factor to make comfort space for designing women's hospital in city.

  • PDF

Design and Implementation of Admission Control System in Smart Space (스마트 공간을 위한 참여 제어 시스템의 설계 및 구현)

  • Yang Jong-Phil;Shim Mi-Sun;Shin Weon;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.342-352
    • /
    • 2006
  • Nowadays, Computing environment is changing to ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, tile wily how to establish trust relationship among previously unknown devices or resources is needed under such environments. In this paper, we firstly review a model to delegate the trust to communicating entities in ubiquitous environment and its security problems(e.g., malicious right-delegation and revocation of right-delegation). Then, we design a new model for secure delegation over communication entities which is based on two-party signature scheme, and implement it.

  • PDF

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Construction of Cubic Panoramic Image for Realistic Virtual Reality Contents (실감형 VR 콘텐츠 제작을 위한 큐브 파노라마 영상의 구성)

  • Kim, Eung-Kon;Seo, Seung-Wan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.431-435
    • /
    • 2006
  • Panoramic Image provides wider field of view than image from acquisition equipment such as a camera and provides realism and immersion to users compared with single image. Cubic panoramic image provides three dimensional access zooming and rotating in top, bottom, left and right directions. But we require commercial softwares to make a panoramic image and can see distorted images in top and bottom direction. This paper presents a method that constructs cubic panoramic virtual reality image using Apple QuickTimeVR's cubic data structure without any commercial software to make realistic image of top and bottom direction in cubic panoramic virtual reality space.

  • PDF