• Title/Summary/Keyword: Rights Control

Search Result 292, Processing Time 0.028 seconds

Development of effective management strategy for geographical database based on the concept of intellectual property rights (지리정보DB의 효율적 유통관리 방안 연구 - 지적재산권 설정을 중심으로 -)

  • 양광식;이종열;이영대
    • Spatial Information Research
    • /
    • v.11 no.1
    • /
    • pp.73-88
    • /
    • 2003
  • Geographical data sets are expensive to create and are very easy to copy because the intellectual property rights for the distribution should be protected. The main object of copyright law is to encourage expression of ideas in tangible form and it extend only to original works, it is limited to control the balance of interests between data producers and user. Because the development of a useful legal framework for both private and public activity in this field is an important issue. This paper presents an intial attempt at such a the effective management strategy intended to support continuing research into the legal protection of geographical information.

  • PDF

A Review about the Studies of Contraception (피임연구 동향에 관한 문헌 연구)

  • Kim, Mi-Jong
    • Korean Parent-Child Health Journal
    • /
    • v.3 no.1
    • /
    • pp.15-26
    • /
    • 2000
  • These days Women have repented their past when they were inactive in attaining their own rights and they've payed attentions in gaining their fundamental rights, especially health rights. The spread of contraception use is important to fulfill women's health right. There are a lot of meanings in the contraception use. It makes women can control their reproductive activities such as pregnancy, delivery, and raising children etc. It gives each woman has autonomy of her life. The review reveals high contraceptive rate and high experienced artificial abortion rate in Korea. It means Korean married couples use contraception inefficiently. From 1970's to 1980's, most of the researches in contraceptions were descriptive and survey studies. Since 1990's, the studies have researched in the feministic perspectives. In order to understand experiences of contraceptive behaviors, qualitative researches through indepth interview did. But the number of researches were limited. The relating factors to contraceptive behavior are knowledge, communication between couples, efficiency of contraceptives, self efficacy, attitudes toward contraception, national policy, mass media, public opinion, age, parity, abortion history, ever-used contraceptive method and educational level. Theses factors affect contraception directly and indirectly. Therefore. researches about contraceptives in the future must focus on development of contraceptive behavior assessment tools and further study should be comprehensive and multidementional.

  • PDF

The DRM System for UCC Rights Protection (UCC 저작권 보호를 위한 DRM 시스템)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.35-39
    • /
    • 2010
  • UCC is a key characteristic of so-called Web 2.0 which encourage the publishing of one's own content and commenting on other people's. Nowadays, UCC has become a widely used. Accordingly, problem of copyright become a issue. In this paper, we propose the DRM system for UCC rights protection. The system solve the copyright problem in UCC. Therefore, UCC creator can exert the right of UCC. In addition, if the problem of copyright occur, we can find the illegal user and call a him to account by CE information which is stored in UCC server and have a property that a manufacture of original contents can control the copyright.

The survey on the use of firearms & equipment in police and the protection of citizens' rights (경찰의 총기·장구 사용과 국민의 인권보호에 대한 실태연구)

  • Jeong, Jeong-ile
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.43-54
    • /
    • 2016
  • Korea's police force has successfully performed its difficult mission of maintaining public order while overcoming difficulties at home and abroad during the past half century. However, the environment in which the forces of law a nd order operate has exponentially increased the demand for, and difficulties faced by, the agents of law enforcement in recent years because of the country's rapid globalization, as well as the move to democracy and localization, and the extensive developments in industrialization and information technology diffusion. This study also intends to investigate the appropriate limits of law enforcement and the use of force by policemen, and the general public's perception of the police as they fulfill their duty of protecting citizens' rights.

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

Financial Structure, Ownership, and Corporate Control (기업의 소유구조 및 지배력과 재무구조)

  • Rhieu, Sang-Yup;Cheong, Ki-Moon
    • Korean Business Review
    • /
    • v.11
    • /
    • pp.195-216
    • /
    • 1998
  • Ownership of an asset can be identified with the right to exercise "residual control" where the contract is silent about decision rights, or with the right to receive any "residual returns" that remain after contractual. obligations are fulfilled. Although the concept of "ownership" seems reasonably clear in many of the cases, the concepts of residual control and the residual returns that define ownership are actually quite elusive. For large corporations, there is really no single individual who owns both the residual returns and the residual control. Despite the limited qualifications, ownership is clearly. the most common and effective meas to motivate people to create, maintain, and improve the value of assets. In this paper, we try to clarify the relationships among financial structure, ownership, and corporate control with the concept of ownership defined as the residual control and the residual returns, Financial securities are not just claims to part of a firm's net income. They give the security holder certain rights. A careful matching of rights of control and returns can create incentives that increase total value of the firms. In the corporate firms, managers, lenders, and shareholders have different interests. And the financial structure affects how different those interests are and what decisions management will make. Managers are, in general, better informed than investors about the firm's prospects. The financial decisions by managers may affect investors' beliefs and, therefore, the price of shares and the value of the firm.

  • PDF

Contract-based Access Control Method for NFT Use Rights

  • Jeong, Yoonsung;Ko, Deokyoon;Seo, Jungwon;Park, Sooyong;Kim, Seong-Jin;Kim, Bum-Soo;Kim, Do-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.1-11
    • /
    • 2022
  • In this paper, we propose an NFT(Non-Fungible Token)-based access control method for safely sharing data between users in blockchain environment. Since all data stored in the blockchain can be accessed by anyone due to the nature of the technology, it is necessary to control access except for authorized users when sharing sensitive data. For that, we generate each data as NFT and controls access to the data through the smart contract. In addition, in order to overcome the limitations of single ownership of the existing NFT, we separated the NFT into ownership and use rights, so that data can be safely shared between users. Ownership is represented as an original NFT, use rights is represented as a copied NFT, and all data generated as NFT is encrypted and uploaded, so data can be shared only through the smart contract with access control. To verify this approach, we set up a hypothetical scenario called Building Information Modeling (BIM) data trade, and deployed a smart contract that satisfies 32 function call scenarios that require access control. Also, we evaluated the stability in consideration of the possibility of decryption through brute-force attack. Through our approach, we confirmed that the data can be safely shared between users in blockchain environment.

A Study on the Improvement of Total Cost Change Control in Private Investment Projects (민간투자시설사업에 있어 총사업비 변경관리의 개선방안 연구 - 고속도로 민간투자시설사업을 중심으로)

  • Kim Se-Jong;Kim Yong-Su
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.119-126
    • /
    • 2001
  • This paper analyzes problems related to total cost changes in private investment projects, and then proposes an improvement measure for the control of cost changes within the framework of the project management, contract, human resource, project communication, cost, and time management. From the viewpoint of contract management, the basis of cost change ought to be cleared up with standardization of related provisions in the concession agreement, and potentiality of change ought to be excluded with prescription of the private investor's leading role from the design phase. Regarding human resource management, this paper proposes a standard work flow granting much sovereign rights to private parts by putting restriction on work scopes of the entrusted authority of government, and transferring the rights of assignment, contract, and control about the responsible supervisor to the concessionaire. With regard to project communication management the notification of changes on drawings and technical documents ought to be automated and the realtime database ought to be established with DMIS (Drawings & Documents Management Information System). From the cost management point of view, this thesis integrates the control of cost-change-approved items and disapproved items to one cost breakdown system, and then harmonizes the actual progress with EVMS in time management.

  • PDF

An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider (내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2010
  • In the paper, we proposed an IM-ACM(Insider Misuse-Access Control Model) for preventing illegal information leakage by insider who exploits his legal rights in the ubiquitous computing environment. The IM-ACM can monitor whether insider uses data rightly using misuse monitor add to CA-TRBAC(Context Aware-Task Role Based Access Control) which permits access authorization according to user role, context role, task and entity's security attributes. It is difficult to prevent information leakage by insider because of access to legal rights, a wealth of knowledge about the system. The IM-ACM can prevent the information flow between objects which have the different security levels using context role and security attributes and prevent an insider misuse by misuse monitor which comparing an insider actual processing behavior to an insider possible work process pattern drawing on the current defined profile of insider's process.

Unfair Contractual Clauses for the Transfer of Technology (국제기술이전계약상(國際技術移轉契約上)의 부공정조항(不公正條項)에 관한 연구(硏究))

  • Seo, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.107-132
    • /
    • 1999
  • The technology transfer agreements, which transfer technology from industrialized countries to developing countries, are subjected to control and restrictions in many developing countries in order to protect national interests. The licensors endeavour, therefore, to ensure that their activities fit satisfactorily into the technological policies and plans of the host countries, and contribute to the development of national scientific and technological potential, including the establishment and improvement in host countries of their capacity to innovate. Secondly, the licensors adopt in the course of their business activities practices which permit the rapid diffusion of technologies with due regard to the protection of industrial and intellectual property rights. Thirdly, the licensors endeavour to grant licenses for the use of industrial property rights or to otherwise transfer technology on reasonable terms and conditions.

  • PDF