• Title/Summary/Keyword: Rights Control

Search Result 294, Processing Time 0.027 seconds

MPEG-21 IPMP's Application and Implementation On Linux Server/Client Environments (Linux Server/client 구조에서 MPEG-21 IPMP의 용용 및 구현)

  • Choi Yong-Soo;Kim Ki-Seob;Kim Hyoung-Joong;Han Hyung-Seok;Song Jeong-Seok;Kim Sung-Soo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.119-123
    • /
    • 2004
  • 이 논문의 목적은 Linux 기반의 서버/클라이언트 구조에서 IPMP 시스템을 구현하는데 있다. DRM(Digital RIghts Management)솔루션을 제공해주는 IPMP(Intellecutual Property Management and Protection)의 참조 소프트웨어인 OpenIPMP 시스템을 기반으로 하며 MPEG-21 권리표현 언어인 XML을 채용하여 새로운 미디어 서비스 환경에 적합한 웹기반 멀티미디어 컨텐츠 서비스 제공 시스템을 구현하는데 있다.

  • PDF

A Study on Human Factor for Port State Control System (항만국통제제도에 대한 인적요인 연구)

  • Lee, Yun-Cheol;Kim, Jin-Kwon;Jeon, Hae-Dong
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.108-109
    • /
    • 2005
  • The aim of Port State Control(PSC) system is recognized as a proficient mechanism in preventing coastal traffic accident and protecting marine environment. Recently, PSC system is focused on human factor of International Maritime Convention, especially ILO and STCW Convention by considering many accidents resulted from human factor. Therefore, we have to understand of Consolidated Maritime Labour Convention which describes employment conditions and social welfare policy, the rights about the lowest wages, the overdue wages, the unemployment protection. a disaster reward, etc and STCW Convention which describes standards of training, certification and watchkeeping for seafarers. The aim of this study is to recognize inspection points about human factor of these Conventions. .

  • PDF

Implementation of IPMP System for MPEG-4 AVC(H.264) (MPEG-4 AVC(H.264) 기반의 IPMP 시스템 구현)

  • Choi, Yong-Soo;Kim, Ki-Seob;Kim, Hyoung-Joong;Han, Hyung-Seok;Park, Jong-Hyuk;Park, Heung-Soo;Koh, Byoung-Soo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.323-328
    • /
    • 2005
  • 이 논문에서는 Linux 기반의 서버/클라이언트 구조에서 H.264 Content에 대한 IPMP 시스템을 구현하고자 한다. DRM(Digital RIghts Management)솔루션을 제공해주는 IPMP(Intellecutual Property Management and Protection)를 관련 참조 소프트웨어들의 변경 통합과정을 거쳐 H.264에 대한 IPMP 시스템을 구현했다.

  • PDF

Limitations on Exclusive Rights of Authors for Library Reprography : A Comparative Examination of the Draft Revision of Korean Copyright Law with the New American Copyright Act of 1976 (저작권법에 준한 도서관봉사에 관한 연구 -미국과 한국의 저자재산권의 제한규정을 중시으로-)

  • 김향신
    • Journal of Korean Library and Information Science Society
    • /
    • v.11
    • /
    • pp.69-99
    • /
    • 1984
  • A dramatic development in the new technology of copying materials has presented us with massive problems on reconciling the conflicts between copyright owners and potential users of copyrighted materials. The adaptation to this changing condition led some countries to revise their copyright laws such as in the U. S. in 1976 and in Korea in 1984 for merging with the international or universal copyright conventions in the future. Copyright defined as exclusive rights given to copyright owners aims to secure a fair return for an author's creative labor and to stimulate artistic creativity for the general public good. The exclusive rights on copyrightable matters, generally for reproduction, preparation of derivative works, public distribution, public performance, and public display, are limited by fair use for scholarship and criticism and by library reproduction for its preservation and interlibrary loan. These limitations on the exclusive rights are concerned with all aspects of library services and cause a great burden on librarian's daily duty to provide balance between the rights of creators and the needs of library patrons. The fair use as one of the limitations on it has been coupled with enormous growth of a new technology and extended from xerography to online database systems. The implementation of the fair use and library reprography in Korean law to the local practices is examined on the basis of the new American copyright act of 1976. Under the draft revision of Korean law, librarians will face many potential problems as summarized below. 1. Because the new provision of 'life time plus 50 years' will tie up substantial bodies of material longer than the old law, until that date librarians would need permissions from the owners and should pay attention to the author's death date. 2. Because the copyright can be sold, distributed, given to the heirs, donated, as a whole or a part, librarians should chase down the heirs and other second owners. In case of a derivative work, this is a real problem. 3. Since a work has its protection from the moment of its creation, the coverage of copyrightable matter would be extended to the published or the unpublished works and librarian's work load would be heavier. Without copyright registration, no one can be certain that a work is in the public domain. Therefore, librarians will need to check with an authority. 4. For implementation of limitations on exclusive rights, fair use and library reproduction for interlibrary loan, there can be no substantial aggregate use and there can be no systematic distribution of multicopies. Therefore, librarians should not substitute reproductions for subscriptions or purchases. 5. For the interlibrary loan by photocopying, librarians should understand the procedure of royalty payment. 6. Compulsory licenses should be understood by librarians. 7. Because the draft revision of Korean law is a reciprocal treaty, librarians should take care of other countries' copyright law to protect foreign authors from Korean law. In order to solve the above problems, some suggestions are presented below. 1. That copyright clearinghouse or central agency as a centralized royalty payment mechanism be established. 2. That the Korean Library Association establish a committee on copyright. 3. That the Korean Library Association propose guidelines for each occasion, e.g. for interlibrary loan, books and periodicals and music, etc. 4. That the Korean government establish a copyright office or an official organization for copyright control other than the copyright committee already organized by the government. 5. That the Korean Library Association establish educational programs on copyright for librarians through seminars or articles written in its magazines. 6. That individual libraries provide librarian's copyright kits. 7. That school libraries distribute subject bibliographies on copyright law to teachers. However, librarians should keep in mind that limitations on exclusive rights are not for an exemption from library reprography but as a convenient access to library resources.

  • PDF

The Effect of Control-Ownership Disparity on Cost Stickiness

  • Chae, Soo-Joon;Ryu, Hae-Young
    • Journal of Distribution Science
    • /
    • v.14 no.8
    • /
    • pp.51-57
    • /
    • 2016
  • Purpose - If control-ownership disparity is large, managers will not actively reduce costs; rather, they will maintain unutilized resources or possess surplus resources even when sales decrease with the purpose of increasing personal utility from status, power, compensation, and prestige. These managers' utility maximizing tendencies cause cost stickiness. We examine whether asymmetric behavior related to costs becomes stronger when there is a large disparity between ownership and control rights. Research design, data, and methodology - We construct a regression model to examine the relationship between control-ownership disparity and cost stickiness. STICKY, a dependent variable representing cost stickiness is a value found using the method of Weiss (2010), and Disparity is an interest variable that shows control-ownership disparity. Results - This study is based from the unique situations in Korea, in which high control-ownership disparity is common in firms. Large control-ownership disparity was found to increase cost stickiness of corporations. Conclusions - The results of this study imply that controlling shareholders may be regarded as a threat to the interests of minority shareholders and corporate values especially when controlling shareholders have significant influence over managers or the power to make managerial decisions as owners of a corporation.

A Study on Human Factors Guidelines for Level 3 Automated Vehicles (레벨 3 자율주행차량의 인적요인 가이드라인 연구 동향)

  • Kim, H.S.;Kwon, O.C.;Lee, S.J.;Kim, J.S.;Kim, W.J.;Yoon, D.S.;Lee, I.H.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.24-36
    • /
    • 2020
  • To solve social problems such as traffic accidents caused by human driver factors and to guarantee the convenience of movement, research on the commercialization of automated vehicles is being actively conducted worldwide. In automated driving levels 2 and 3, the driver must be ready to drive at any time as the automated driving system sometimes requires manual driving by the driver. The purpose of this research is to analyze the trends in global automated vehicle guidelines and prepare guidelines for the characteristics of human factors necessary for the control rights transition system of automated vehicles. To this end, we reviewed at the guidelines for automated vehicles in the US, Germany, and Japan; ISO international standards; domestic automated vehicle standards; and the EU AdaptiVe project. In addition, a guideline is presented that can be referenced and applied by organizations related to automated vehicle manufacturing and operation. It was developed by utilizing the results of our studies on the human factors affecting the guideline of control rights transition. As national laws and regulations and continuous technology development for commercialization of automated vehicles are in progress, further research into and the revision of guidelines for safe automated vehicle production and use should be continued.

Design and Implementation of an Access Control System for XML Documents on the Web (웹에서의 XML 문서 접근 제어 시스템의 설계 및 구현)

  • Lee, Yong-Kyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3623-3632
    • /
    • 2000
  • Until now the XML document is allowed users to access the whole content of it However, for some applications such as those in the field of electronic commerce, there are cases that the whole content should not be delivered. Therefore, access authorization is required for XML documents in order to protect illegal accesses to some critical parts of them. In this paper. we design and implement a system which authorizes users to XML documents and controls access to them based on the access rights. We set the user group as a basic unit of the authorization subject and the element of an XML document as a basic unit of authorization object The owner of a document authorize; user groups to access the elements of it When an XML document is accessed, the access rights of the requester are checked using an access control list and only the authorized parts are delivered_ As the result, we can authorize XML documents, which has been previously impossible.

  • PDF

Normative-Legal and Information Security of Socio-Political Processes in Ukraine: a Comparative Aspect

  • Goshovska, Valentyna;Danylenko, Lydiia;Chukhrai, Ihor;Chukhrai, Nataliia;Kononenko, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.57-66
    • /
    • 2022
  • The aim of the article is to investigate socio-political processes in Ukraine on the basis of institutional and behavioral approaches, in particular their regulatory and informational support. Methodology. To determine the nature and content of sociopolitical processes, the following approaches have been used: 1. Institutional approach in order to analyze the development of Ukraine's political institutions. 2. The behavioral approach has been used for the analysis of socio-political processes in Ukraine in the context of political behavior of citizens, their political activity which forms the political culture of the country. Results. The general features of the socio-political situation in Ukraine are as follows: the formed model of government, which can be conditionally described as "presidential"; public demand for new leaders remains at a high level; the society has no common vision of further development; significant tendency of reduction of real incomes of a significant part of the society and strengthening of fiscal pressure on businessmen will get a public response after some time. Increasing levels of voice, accountability, efficiency of governance and the quality of the regulatory environment indicate a slow change in the political system, which will have a positive impact on public sentiment in the future. At the same time, there has been little change in the quality of Ukraine's institutions to ensure political stability, the rule of law and control of corruption. There are no cardinal changes in the development of the institution of property rights, protection of intellectual rights, changes in the sphere of ethics and control of corruption. Thus, Ukraine's political institutions have not been able to bring about any change in the social-political processes. Accordingly, an average level of trust and confidence of citizens in political institutions and negative public sentiment regarding their perception and future change can be traced in Ukraine.

A Study on Legal Protection, Inspection and Delivery of the Copies of Health & Medical Data (보건의료정보의 법적 보호와 열람.교부)

  • Jeong, Yong-Yeub
    • The Korean Society of Law and Medicine
    • /
    • v.13 no.1
    • /
    • pp.359-395
    • /
    • 2012
  • In a broad term, health and medical data means all patient information that has been generated or circulated in government health and medical policies, such as medical research and public health, and all sorts of health and medical fields as well as patients' personal data, referred as medical data (filled out as medical record forms) by medical institutions. The kinds of health and medical data in medical records are prescribed by Articles on required medical data and the terms of recordkeeping in the Enforcement Decree of the Medical Service Act. As EMR, OCS, LIS, telemedicine and u-health emerges, sharing and protecting digital health and medical data is at issue in these days. At medical institutions, health and medical data, such as medical records, is classified as "sensitive information" and thus is protected strictly. However, due to the circulative property of information, health and medical data can be public as well as being private. The legal grounds of health and medical data as such are based on the right to informational self-determination, which is one of the fundamental rights derived from the Constitution. In there, patients' rights to refuse the collection of information, to control recordkeeping (to demand access, correction or deletion) and to control using and sharing of information are rooted. In any processing of health and medical data, such as generating, recording, storing, using or disposing, privacy can be violated in many ways, including the leakage, forgery, falsification or abuse of information. That is why laws, such as the Medical Service Act and the Personal Data Protection Law, and the Guideline for Protection of Personal Data at Medical Institutions (by the Ministry of Health and Welfare) provide for technical, physical, administrative and legal safeguards on those who handle personal data (health and medical information-processing personnel and medical institutions). The Personal Data Protection Law provides for the collection, use and sharing of personal data, and the regulation thereon, the disposal of information, the means of receiving consent, and the regulation of processing of personal data. On the contrary, health and medical data can be inspected or delivered of the copies, based on the principle of restriction on fundamental rights prescribed by the Constitution. For instance, Article 21(Access to Record) of the Medical Service Act, and the Personal Data Protection Law prescribe self-disclosure, the release of information by family members or by laws, the exchange of medical data due to patient transfer, the secondary use of medical data, such as medical research, and the release of information and the release of information required by the Personal Data Protection Law.

  • PDF

Rights to Control Information and Related Security Technologies on the CyberSpace (사이버공간에서 자기 결정권과 보안 기술)

  • Min, Kyung-Bae;Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.135-141
    • /
    • 2010
  • This research examines technologies and systems regarding right to control information in the network era. For this purpose, It attempts an integrated analysis of technologies and systems on the basis of the tree components of cyberspace. And it examines the prior researches and cases on privacy, personal information, and right to control information with emphasis on technologies and systems of the cyberspace. To protect privacy information, it analyses vulnerability of element technology, platform service technology, and individual technology. In particular, it describes, from the perspective of right to control information, the risk and security measures for personal information to be used as relation-context in the Web 2.0 environment. The research result will assist the methodology of future researches for grand theory on privacy information and help understanding the interaction between technology and society.