• Title/Summary/Keyword: access right

Search Result 334, Processing Time 0.024 seconds

Authority Control in the Digital Age: A Study of japanese Journal Titles and Corporate Names in the OPACs in Korea (디지털 정보시대의 전거통제 (II): 국내 목록 데이터 베이스의 일본 학술지명과 단체명 연구)

  • 윤정옥
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.4
    • /
    • pp.161-175
    • /
    • 2001
  • The purpose of this study is to examine how the titles and corporate names of Japanese scholarly journals are treated, and how well the authority control is implemented to assist the access with various names and forms of names to the OPACS. Without the help of either references or internal links among those names and forms of names in the DBs, users are likely to fail in getting the right results. In this study, the cataloging records for serials from the National Assembly Library, KISTI, Yonsei University and the KERIS were examined, and the comparison was made with the records from the NACIS-WebCat of the National Institute of Informatics in Japan. Major findings include (1) the lack of consistency in applying cataloging rules, (2) the lack of proper authority control in treating corporate names, and (3) the lack of references or links among names and variant forms of names. The overall improvement of cataloging practices and application of authority control is strongly recommended for enabling users to access better to those DBs of interest.

  • PDF

Refusal to Dealing of Essential Facilities under Fair Trade Act -Focused on Adoption of Broadcasting Contents- (공정거래법상 필수설비의 거래거절 -방송 콘텐츠의 적용을 중심으로-)

  • Kim, Hee-Kyung;Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.115-127
    • /
    • 2011
  • As broadcasting contents are recognized as a key competition means, there are issues raised such as improvement of terrestrial retransmission system, introduction of PAR in broadcasting market and so forth. Especially, in pay broadcasting market, strategic partership between SP and PP leads to contents exclusivity for competitors, which causes to hinder normal competition and limit viewers' right of access. Consequently, not only is it claimed that essential facilities doctrine should be adopted in broadcasting market, but also clause of content equal access in IP TV law and adoption of prohibited acts regulation can be viewed in the same context. However, adoption of essential facilities doctrine in broadcasting market is likely to be counterproductive because of the differences of philosophies, economies and legal systems on which general facilities and contents are based. Therefore, it is time for a essential facilities concept, a fundamental concept of a refusal to dealing of essential facilities, and basic works to review specific cases and precedents implemented in competition laws market This study aims to review and propose beforehand if adoption of essential facilities doctrine is appropriate for broadcasting contents.

A Study on the Transformation of Space Organization of a Traditional Houses in Kyideok Village, Jeju, Korea (제주 귀덕마을 전통가옥의 공간구조 변화에 관한 조사연구)

  • Shin, Woong-Ju
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.12 no.2
    • /
    • pp.67-76
    • /
    • 2010
  • This study examined and analyzed uses, transformations, changes of plane and arrangement, and changes of space structure of housing components with traditional folk houses located at Kyideok village, Hanrim-eup, Jeju, and the results of the study can be summarized as follows. First, the exposure of arrangement of folk houses at Kyideok village, Jeju was evenly distributed to the east, the southeast, the northeast and the west in order and it was little different from the use of sunshine conditions by placing the main room on the south in traditional houses of land areas. Second, the space structure of inner room before transformation was divided into seven types. 3-room type was classified into "Sangbang-centered three-room type" and "nanggan-centered three-room type", 4-room type into "four-room type with inner access to warehouse", "four-room type with outer access to warehouse", "kitchen-divided four-room type", "four-room type with two kitchens", "four- room type with nanggan at the right back". Third, according to types of change in arrangement type, the first is new annex addition to existing inner room, the second is the removal of existing annexes including outer room, the third is the extension of inner room size without new construction of annex, the fourth is new construction of annex with new plane form after removal of existing annex, the fifth is no change in arrangement of inner room, outer room, stable, warehouse, etc. Fourth, transformation of space components led to changes of space structure as well as those of plane form. Changes of space structure were divided into reduction type of circulation to specific factors, negligence type without using increased space factor, and addition type having various circulations through the increase of convenience space.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

A Research on the Digital Information of the Deceased (사자(死者)의 디지털 정보에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.247-253
    • /
    • 2010
  • The demand that needs 'Digital Legacy', a notion that an Internet user can transfer his private blogs, e-mail and financial assets to inheritors and party interested when he died suddenly in the accident, has been growing recently. This issue has become a social hot potato since Justine Ellsworth's father in USA sued Yahoo for the right to access his son's Yahoo e-mail account after Justine Ellsworth had died in Iraq, in November, 2004 and the problems happened to deal with suicide-related blogs and homepages when great entertainers in Korea committed suicide and soldiers' parents in the situation of warship Chonan tragedy in Korea demanded access to soldiers' homepages and e-mail accounts. The point at issue focuses on the property matters about the digital information of the deceased and the relationship between the deceased and the Internet Service Provider(ISP). This research looks into the trend of judicial precedents and laws related to the digital information of the deceased and suggests the preliminary data of the next research.

Factors Influencing Healthy Living Practice by Socio-ecological Model (사회생태학적 모형에 의한 건강 생활 실천 관련 요인)

  • Kim, Yoonjung;Park, Jung-Ha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.351-361
    • /
    • 2021
  • The purpose of this study is to provide basic data for resolving individual and regional health inequalities by identifying factors that affect healthy living practices, and to protect the access to health equity and the access to health equity and the people's right to health. Raw data from the 2019 Community Health Survey were used, and descriptive statistical analysis and multivariate logistic regression analysis were performed using SAS 9.4 and IBM SPSS ver. 21. The healthy living practice rate was 33.8% overall, and there was a difference of 11~20% by region. In terms of individual factors, healthy living practices were significantly different in gender, age, occupation, sleep time, subjective health status, and subjective stress level. In the interpersonal factor, there was a difference in social activity for healthy living practice, and in the community factor, positive attitude toward the local physical environment, annual unsatisfied medical care, and use of health institutions were significant. In order to increase the practice of healthy living by region based on the research results, comprehensive policies and cooperative measures that can be approached at the individual, social and national level should be implemented along with specific strategies.

Preservice Teachers' Responses to Postmodern Picture Books and Deconstructive Reading

  • Yun, Eunja
    • Journal of English Language & Literature
    • /
    • v.57 no.6
    • /
    • pp.1111-1130
    • /
    • 2011
  • Reading postmodern texts certainly situates readers in roles different from the ones we have been used to. Recently, postmodern metafiction forms a significant body of children's literature that is intended to challenge and transform the conventions of books in the digital age. While many studies have been done as to how child readers have capabilities to appreciate and interpret postmodern metafiction picture books, few studies on teachers and preservice teachers' reactions are not readily available. The role of teachers and preservice teachers are crucial for child readers to have access to affluent reading resources. This study discusses how preservice teachers read and respond to postmodern metafiction picture books using a deconstructive approach by means of binary opposites. Data was collected with 14 preservice teachers as to their likes/dislikes, reading levels, and reading paths about postmodern metafiction picture books. Expected pedagogical implications for literacy and language education were requested to address in their reading diaries and response papers. With their likes/ dislikes, since binary opposites always imply the hierarchy of power and value, the likes is apparently more valued and appreciated over their dislikes. This differentiated values are discussed in more detail with three recurring themes-Education, Morals and Behavior, and Tradition. With reading levels, there seems to be a gap existing between the authors' implied reader and literary critics' and the preservice teachers' ideal readers for the postmodern metafiction picture books. Although many studies have already revealed young readers' capability of appreciating postmodern metafiction, it depends a lot more on the teachers and preservice teachers whether children's right to have access to affluent literacy resources is respected or not. Preservice teachers' awareness of the potential of postmodern metafiction will work as an initial step to bring and realize the new reading path and new literacies in classrooms. By challenging metanarratives of children's literature, preservice teachers' readings of postmodern picture books reveals potentials to raise different reading paths and develop new literacies and other educational implications.

Anal Endosonographic Features of the Normal Anus in Children (소아에서 항문 내초음파 검사상 정상 항문관의 형태학적 소견)

  • Baek, Sang-Hyun;Park, Kyung-Nam;Park, Jin-Su;Yoo, Soo-Young
    • Advances in pediatric surgery
    • /
    • v.4 no.2
    • /
    • pp.93-99
    • /
    • 1998
  • Anal endosonography has recently been popularized in adult patients in order to access staging of rectal cancer and other lesions of the anorectum. This study is not familiar to pediatric surgeons. We performed anal endosonography in 30 children without anorectal disease in order to determine the standard morphology of the anorectum. The internal anal sphincter(IAS) was clearly identified as a homogeneous hypoechoic circular band, extending caudally to a level just proximal to the anal verge. The external anal sphincter(EAS) showed mixed echogenicity and different architecture along the anal canal; the EAS was U-shape in the upper canal and it had a circular pattern in the lower canal. In the upper canal of girls, the perineal body and the vagina were found just anterior of the anal canal, which made the U shape of the EAS. In the male, the sphincter tapered anteriorly into two arcs that met in the midline. The perineal body was prominent in the female. Posteriorly, the anococcygeal ligament was represented by a triangular shadow in both sex. The thickness of the IAS was measured in 3 directions, left, right and posterior, at 3 levels, upper, middle and lower areas of the anal canal. The average thickness was 0.86-2.40 mm between 6 and 18 months of age(Group 1), 0.88-3.20 mm between 19 and 36(Group 2), 1.07-2.20 mm between 37 and 54(Group 3) and 1.18-2.42 mm more than 54-month-old(Group 4). The thickness was correlated with the age of the children only in the right upper(p=0.008) and the left middle portion(p=0.015). We were able to obtain standard morphologic features of the normal anal canal in children with anal endosonography. We believe that this technique is a safe and an effective procedure to evaluate anorectal lesions in children.

  • PDF

An Efficient Encryption Scheme Combining PRNG and Permutation for Mobile Multimedia Data (모바일 멀티미디어 데이타를 위한, 의사난수생성기와 순열 기법을 결합한 효율적인 암호화 기법)

  • Han, Jung-Kyu;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.581-588
    • /
    • 2007
  • In Digital Right Management, symmetric cipher is used for content encryption to reduce encryption cost, AES, advanced encryption standard is usually used to multimedia encryption under desktop environment because of its reasonable security level and computation cost. But mobile handheld device often uses slow speed processor and operates under battery-powered environment. Therefore it requires low computation cost and low energy consumption. This paper proposes new stream cipher scheme which combines pseudo random number generator(PRNG) and dynamically generated permutations. Proposed scheme activates PRNG and generates original key streams. Then it generates extended key streams by applying permutation to original sequence. These extended key streams are XORed with plaintext and generate ciphertext. Proposed scheme reduces the usage of PRNG. Therefore this scheme is fast and consumes less energy in comparison with normal stream cipher. Especially, this scheme shows great speed up (almost 2 times) than normal stream cipher scheme in random access.

Biometrics Based on Multi-View Features of Teeth Using Principal Component Analysis (주성분분석을 이용한 치아의 다면 특징 기반 생체식별)

  • Chang, Chan-Wuk;Kim, Myung-Su;Shin, Young-Suk
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.445-455
    • /
    • 2007
  • We present a new biometric identification system based on multi-view features of teeth using principal components analysis(PCA). The multi-view features of teeth consist of the frontal view, the left side view and the right side view. In this paper, we try to stan the foundations of a dental biometrics for secure access in real life environment. We took the pictures of the three views teeth in the experimental environment designed specially and 42 principal components as the features for individual identification were developed. The classification for individual identification based on the nearest neighbor(NN) algorithm is created with the distance between the multi-view teeth and the multi-view teeth rotated. The identification performance after rotating two degree of test data is 95.2% on the left side view teeth and 91.3% on the right side view teeth as the average values.

  • PDF