• Title/Summary/Keyword: convergence of information protection

Search Result 432, Processing Time 0.022 seconds

A Study on the Internet Defamation Policy and Law - Focusing on the Communications Decency Act of 1996 and the Brodie Case (인터넷 명예훼손 방지를 위한 정책과 법안에 관한 연구 - 미국의 통신품위법과 Brodie 사건을 중심으로)

  • Bae, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.29-37
    • /
    • 2012
  • Defamation is one of the most frequently occurring daily legal violation because it can easily be done by words. In the internet generation with flooding internet forum websites and social network services, internet defamation is becoming one of the most serious problems in many leading IT countries including Korea and the United States. Being such a critical issue that can lead to a suicide, Korean policy makers has undertaken efforts to prevent the internet defamation by defining the liabilities of internet users and internet service providers. Many of the policies and laws including "the Telecommunication Information Usage Promotion and Security Protection Act of 2007" are modeled after that of the United States. Thus, the study aims to explore American defamation law and internet defamation law analyzing "the Communications Decency Act of 1996" and a recently decided precedent, "Brodie" case, in Maryland state court.

A Study on a Project-based Blockchain Web Developer Education Model Customized for Companies (기업 맞춤형 프로젝트 기반 블록체인 웹 개발자 교육모델에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.77-83
    • /
    • 2022
  • In the era of the 4th industrial revolution, various universities' corporate field application education models are being presented. In particular, along with new teaching methods, various educational models for customized education of many companies are being studied, increasing their usability. Research on project-oriented teaching methods for competencies required in the field of business is the most developed field in recent years. In this study, we intend to propose a case-oriented curriculum model that applies the project-oriented teaching method to the requirements of these companies. In particular, we design an industry-oriented curriculum model through a companycustomized education model for blockchain and web developers, and suggest the direction of development focusing on examples of the operation process. The model through this case was designed and operated as a curriculum model suitable for the field through in-depth interviews with industries, etc.

Trend and Improvement for Privacy Protection of Future Internet (미래 인터넷 기술의 Privacy 보호 기술 동향 및 개선)

  • Kim, DaeYoub
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.405-413
    • /
    • 2016
  • To solve various problems of the Internet as well as to enhance network performance, various future Internet architectures utilize cached data in network nodes or in proxy servers. Named-data networking (NDN), one of future Internet architectures, implements in-network data caching functionality, and then responds itself to request messages. However, it can cause users' privacy invasion that the publisher of data can not engage in the sharing/using process of the data anymore after the data was cached in-network. So NDN implements both encryption-based access control and group access control. But, since such access control schemes need to exchange additional messages in order to search for a proper access control list and keys, it causes inefficiency. This paper surveys the access control schemes of NDN, and then proposes an improved scheme.

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

A New Recovery Method to Privide Diverse Service Demands for Loss Sensitive Medical Data on IP over WDM Networks (IP over WDM 네트워크에서 손실에 민감한 의료 데이터를 위한 다양한 서비스 요구사항을 만족하는 새로운 복구 방법)

  • Lee, Yonggyu
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.377-388
    • /
    • 2022
  • Various researches are actively studied to satisfy exponentially increasing the usage of the Internet as well as the diverse service demands. Especially the Optical Internet that delivers several Tbps through a single optical fiber requires the intelligence to satisfy the various types of survivability requirements. In the paper, a novel recovery scheme that satisfies the various restoration demands in IP over WDM networks is proposed. The scheme classifies the restoration services into three classes and applies dedicated protection and shared restoration scheme with different priorities for each class. Also, a configuration scheme for information database to support the scheme is proposed. This scheme satisfies the different degree of restoration demands in terms of restoration time, blocking rate and resource usage. With the scheme, medical data can be transmitted without loss.

A Study on Intensifying Efficiency of Presidential Security Service Organization through the Analysis of Press Media (언론매체 분석을 통한 대통령경호조직의 효율성 제고에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.23-32
    • /
    • 2014
  • Quantitative rise and This study carried out qualitative research by utilizing NVivo 10 focusing on the contents of mass media such as newspaper or internet on the presidential security service up to the Park Geun-hye government from the 3rd Republic of Korea, which was established the presidential security service. The aim is to present opinion so that the presidential security organization can strengthen capability and function within the governmental organization down the road based on the contents of categories, which were elicited through this. First, there is a need of solidifying the internal stability with the expansion in the activity sphere of organization and of externally approaching the public with removing sense of difference caused by offering personal protection only to some of the privileged class in the meantime. Second, it is the foundation of a reason related to crime in a cause for Discharge by Authority pertinent to "law on security for president and others" in Article 10 in order to prevent a criminal act of having abused the task characteristic and the position superiority or an external pressure act related to intervention in rights. Third, there is a need of making it recognized as very important organization with putting differentiation from other organizations of the government by providing the disciplinary level more strictly than "disciplinary order on public officials" based on particularity and importance dubbed presidential security service along with correspondingly applying "disciplinary order on public officials" in Article 31 in accordance with "enforcement ordinance of law on security for president and others" in terms of service negligence and false-information report in relation to task performance.

A Case Study on the Online Fractional Investment Securitization Platform (온라인 분할 투자 증권화 플랫폼 사례 연구)

  • Tae Hyup ROH
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.747-754
    • /
    • 2023
  • With the development of information and communication technology, online fractional investment platforms have emerged through the convergence of online platform technology and new investment techniques for asset-backed derivatives. In this study, the concept and previous studies of the online fractional investment platform business, commercialization models and service processes, market status, and pending discussions and alternatives were presented. Recently, the Securities and Futures Commission's decision on securitization of split ownership has become an important guide to the stable business sustainability of platform operators, but academic research is needed according to the current status and case analysis. To identify specific market issues, examples of representative online fractional investment securitization platform businesses such as "MusiCow" for music copyright, "Tessa" based on art, "Kasa" for real estate, "Piece" based on real assets, and "BangCow" for Korean beef shipments were analyzed. Through the case analysis of this study, the characteristics of the business model according to the basic assets of the online fractional investment platform were compared and presented. Since most business models are judged to be securitic, they must comply with the provisions of the Capital Markets Act or be recognized as the target of innovative financial services. From a practical point of view, it is meaningful in that it presented improvement directions that online fractional securitization platform operators should consider and organized institutional considerations for investor protection.

Secure Training Support Vector Machine with Partial Sensitive Part

  • Park, Saerom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we propose a training algorithm of support vector machine (SVM) with a sensitive variable. Although machine learning models enable automatic decision making in the real world applications, regulations prohibit sensitive information from being used to protect privacy. In particular, the privacy protection of the legally protected attributes such as race, gender, and disability is compulsory. We present an efficient least square SVM (LSSVM) training algorithm using a fully homomorphic encryption (FHE) to protect a partial sensitive attribute. Our framework posits that data owner has both non-sensitive attributes and a sensitive attribute while machine learning service provider (MLSP) can get non-sensitive attributes and an encrypted sensitive attribute. As a result, data owner can obtain the encrypted model parameters without exposing their sensitive information to MLSP. In the inference phase, both non-sensitive attributes and a sensitive attribute are encrypted, and all computations should be conducted on encrypted domain. Through the experiments on real data, we identify that our proposed method enables to implement privacy-preserving sensitive LSSVM with FHE that has comparable performance with the original LSSVM algorithm. In addition, we demonstrate that the efficient sensitive LSSVM with FHE significantly improves the computational cost with a small degradation of performance.

Abolition of restrictions and research on precondition for nominating drone photographing free area (규제혁파, 드론 촬영 자유구역 지정을 위한 선결조건 연구)

  • Seok, Geum-Chan;Park, Gye-Soo;Nam, Soung-Ho;Kim, Young-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.209-217
    • /
    • 2020
  • The background of the research is the following. With the prosperity of drone industry, the government has been actively promoting measures to nominate 'drone photographing free areas'. However, existing laws, and procedures are rather unclear with related environmental factors in discordance with one another. Hence, voices in need for establishing a clear precondition for nominating drone photography free area have been rising. The purpose of the research is to provide measures for the preconditions to establish photography free areas for convenient drone photographing. The research utilizes literary methods, conducting focus group interviews to coordinate with specialists who can participate and discuss so that they can provide improvement measures. The research renders improvement measures in different sectors including 2x items in aviation security law, 8x items in free area nomination and procedure, 4x items in infrastructure establishment and information management area. The expected effects are the following: by attaching drone photography with aviation security law, nominating photography free area can be linked up with the Ministry of Land Infrastructure and Technology. Secondly, by enlarging photography restricted area to upper mid-air, a three dimensional drone security will be possible. Thirdly, by providing a 'Yongin area standard model', free area nomination will become more easy. Future research will focus on enhancing aviation security law regarding drone photographing. In addition, the promotion to nominate free areas for 33x responsible areas in accordance with the National Intelligence service will be required.

Study on the Methods of Security and Quality Evaluation of smart Healthcare System (스마트 헬스케어 시스템의 보안성 품질평가 방법에 대한 연구)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.251-259
    • /
    • 2017
  • Recently, the smart healthcare industry that grafted the Internet of Things (IoT) onto the healthcare and medical services is being highlighted. Smart healthcare refers to the healthcare and medical services offered on the basis of information communication technologies including application, wearable devices and platforms, etc. The number of next generation smart healthcare devices are increasing in the smart healthcare industry through the combination of information technology (IT) and Bio Technology (BT), which are the most active areas among the 6T, which are the areas of the next generation industry. With the emergence of a diverse range of smart healthcare systems or devices, whether the smart healthcare system can be linked with other systems organically and the security and quality of the system have become important elements of evaluation. In this Study, the characteristics and service types of smart healthcare systems were examined, and the trends in the technology and industry of the smart healthcare system were analyzed. Moreover, this Study aims to develop the evaluation method for security and standards for quality evaluation by deducing the factors for the evaluation of smart healthcare system on the basis of the results of aforementioned examination. It is anticipated that this can induce improvement of quality and development of highly reliable products of a smart healthcare system, and will become the core technology to substitute the technology protection barrier.