• Title/Summary/Keyword: Right to Access

Search Result 325, Processing Time 0.03 seconds

Legal Issues In Information Management (정보관리와 관련된 법적문제)

  • Lee Soon Ja
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.19
    • /
    • pp.23-61
    • /
    • 1990
  • Libraries and information centers are no different from any other institutions in our society. Today, their managers have to make many more decisions which have certain legal implications than before. The ignorance of the law on their parts can not be an acceptable excuse anymore, since. the consequences sometimes maybe quite serious. This paper outlines some important legal issues involved in the services and management of libraries and information centers. They are: constitutional rights on human knowledge activities: library act and it's related laws; censorship and right to know; information access and the protection of privacy: library services and copyright law; labor relations; protections of the people and properties of the institutions, etc. The laws are not static: rather, they change with the social, political and technological environments. The managers, as well as the staff members of libraries and information centers should be constantly updated with the changes in the field, in order to give the maximum service to the clients and to prevent any infringement of the laws, which may discredit their services and the institutions.

  • PDF

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

A Study on the Disclosure and Exemption of the Personal Data (개인정보의 공개와 보호에 관한 연구 - 영국 사례를 중심으로 -)

  • Kim, Jung Ae
    • The Korean Journal of Archival Studies
    • /
    • no.29
    • /
    • pp.225-268
    • /
    • 2011
  • The general public are interested in the politics and form public opinion and keep in check the government for true democracy. The general public have the right to be furnished information from the government. And the government should enact the Freedom of Information Act to provide the public's right to know. At the same time, the government should enact the Data Protection Act to provide the public's right to privacy. There is a friction between the Freedom of Information Act and the Data Protection Act. It's hard to maintain the proper balance between the Freedom of information Act and the Data Protection Act, but many countries try to do so. The UK enacted the Data Protection Act 1998(DPA), which entered into force on 2000, to comply with EU Directive 1995. The Freedom of Information Act 2000(FOI), which came fully into force on 2005, was passed in 2000. The FOI imposes significant duties and responsibilities on public authorities to give access to the information they hold. The purpose of this study is to consider the provisions of the personal data in FOI and DPA. Besides this, it identifies the complaint cases on public authorities about the disclosure and exemption of the personal data in comparison with the acts. If information is the personal data of the person making the request, it will disclose under the DPA. If information is the personal data of a third party, it will disclose under the FOI. These acts interact each other to make up for the weak points in the other to make a proper application of the act on public authorities. This study may have any limitation in making a comparative study of the disclosure and exemption of the personal data in Korea. But it is expected to provide a basis for understanding the disclosure and exemption of the personal data in the UK.

Avoiding Venous Anastomotic Dehiscence of an Arteriovenous Graft in a Super-Obese Patient

  • Bae, Miju
    • Journal of Chest Surgery
    • /
    • v.53 no.6
    • /
    • pp.417-419
    • /
    • 2020
  • Surgeons avoid creating arteriovenous fistulae in obese patients owing to deep vessels, cannulation complications, and inconsistent outcomes. We describe placing an arteriovenous polytetrafluoroethylene (PTFE) graft between the brachial artery and axillary vein to avoid these complications. A 39-year-old super-obese woman with end-stage renal disease had undergone several hemodialysis access procedures on both arms. We traced the course of the arteriovenous graft course with the patient sitting and lying down. The ideal course was more accurate with the patient sitting; thus, the patient sat when the course was drawn, before lying on the operating bed. The PTFE graft was placed between the right brachial artery and axillary vein, according to the course in the opposite arm. No anastomotic dehiscence or pseudoaneurysm has taken place during 2 years of follow-up. In super-obese patients, the ideal course for arteriovenous grafts should be drawn while they are sitting, avoiding skin folds. This tip could avoid anastomotic dehiscence and pseudoaneurysm between the axillary vein and a PTFE graft.

Background and Present State of Swedish Child-care System (스웨덴 보육의 배경과 현황)

  • Kwon, Jeong Yoon;Han, You Me
    • Korean Journal of Child Studies
    • /
    • v.26 no.2
    • /
    • pp.175-191
    • /
    • 2005
  • Sweden has one of the world's most progressive and comprehensive childcare systems; synonymous with quality, it is the envy of many other countries. The purpose of this study was to investigate background factors important to the development of the Swedish childcare system and the current childcare policy and system. This study found that underpinning the Swedish childcare system is not only the expectation that men and women will participate equally in the workforce, child rearing, and domestic life but also an awareness of the right of children to development and education. Implementation of the Swedish childcare policy has provided for easy access and affordable childcare centers following principles of childcare universalism. This provides practical suggestions for the Korean childcare policy and system.

  • PDF

A Study on the Design and Implementation of the Lightweight Object Model Supporting Distributed Trader (분산 트레이더를 지원하는 경량 (lightweight) 객체 모델 설계 및 구현 방안 연구)

  • Jin, Myeong-Suk;Song, Byeong-Gwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1050-1061
    • /
    • 2000
  • This paper presents a new object model, LOM(Lightweight Object Model) and an implementation method for the distributed trader in heterogeneous distributed computing environment including mobile network. Trader is third party object that enables clients to find suitable servers, which provide the most appropriate services to client in distributed environment including dynamic reconfiguration of services and servers. Trading service requires simpler and more specific object model than genetic object models which provide richer multimedia data types and semantic characteristics with complex data structures. LOM supports a new reference attribute type instead of the relationship, inheritance and composite attribute types of the general object oriented models and so LOM has simple data structures. Also in LOM, the modelling step includes specifying of the information about users and the access right to objects for security in the mobile environment and development of the distributed storage for trading service. Also, we propose and implementation method of the distributed trader, which integrates the LOM-information object model and the OMG (object Management Group) computational object model.

  • PDF

A Study on the Document Copy Detection System for Protection of Digital Document Contents (디지털 문서 콘텐츠 보호를 위한 문서 복제 탐지 시스템에 관한 연구)

  • Kim, Heon
    • Journal of Digital Contents Society
    • /
    • v.7 no.3
    • /
    • pp.199-205
    • /
    • 2006
  • Due to easy access to information in our digital society, there are many cases of illegal counterfeiting and usage of personal information. Producing information with investment and effort is important indeed, but managing and protecting information is becoming a furthermore important issue. This is to promote a new detecting theory and solution for cases of intellectual property violations and plagiarizing digital contents.

  • PDF

A Study on Improvements of the Educational Facilities & Equipment Services Supporting for Disabled Students in University (장애대학생 교육복지지원 시설·설비부문의 개선방안에 대한 연구)

  • Min, Kyung-Suk
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.27 no.5
    • /
    • pp.24-31
    • /
    • 2020
  • This study proposed an effective improvement direction for the education and welfare supporting facilities and equipment sectors to guarantee the right of disabled students to study in university. To derive high-demand items, the value engineering quality model technique was conducted on the students who majoring in architecture and the disabled students. The high-demand items for the education and welfare supporting facilities and equipment was detailed by interviews with the disabled students. Especially, anti-skid floor material, spacious access space for electric wheelchair, efficient operation system for elevator and cafeteria waiting time are strongly demanded for the disabled students. Based on this research, universities can make efficient investments and improvements in the education and welfare supporting facilities and equipment sectors for disabled students.

A Study on Video Encryption Algorithm for DRM-based MP4 Streaming (DRM 기반 MP4 스트리밍을 위한 비디오 암호화 알고리즘에 관한 연구)

  • 김정현;윤기송;전경표
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.218-222
    • /
    • 2003
  • Internet has made it easer to get information, also distribute and exchange it among people. It brings about issues regarding intelligent property and copyright threats. h a multimedia commerce such as video-on-demand, Internet broadcasting services, only users who have rights for use of these services should be able to access and watch those video or movies In this paper, we propose DRM(Digital Right Management) system for P4 -based streaming and MP4 encryption algorithm for proposed DRM system.

  • PDF

A new 4-way search window for improve memory bandwidth by 2-D data reuse for ME in H.264 (H.264의 움직임추정에서 2차원 데이터재사용으로 메모리대역폭을 개선하기 위한 4방향 검색윈도우)

  • Lee, Kyung-Ho;Lee, Seng-Kwon;Kong, Jin-Hyeung
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.403-404
    • /
    • 2008
  • In this paper, a new 4-way search window is developed for H.264 Motion Estimation(ME) to improve the memory bandwidth. The proposed 4-way(up, down, left, right) search window could improve the reuse of overlapped window data to reduce the redundancy access factor by 1.4, though the 1/3-way search window requires $7.7{\sim}11$ times of data retrieval redundantly. In experiments, the new implementation of 4-way search window on Altera Stratix-III could deal with CIF ($352{\times}288$) video of 3 reference frame, $48{\times}48$ search area and $16{\times}16$ macroblock by 30fps real time at 55.2MHz.

  • PDF