• Title/Summary/Keyword: digital rights

Search Result 460, Processing Time 0.025 seconds

Development of Document Security System for KSLV-I Program (KSLV-I 문서보안시스템 개발)

  • Lee, Hyo-Young;Joh, Mi-Ok;Hong, Il-Hee
    • Aerospace Engineering and Technology
    • /
    • v.7 no.1
    • /
    • pp.210-215
    • /
    • 2008
  • Most of technology information obtained from KSLV-I program have been managed by Program Life-Cycle Management System(PLMS). As involving technologies in the program require high level of confidentiality as those may be dealt with entities in international cooperation, the enforcement of strict security policy is inevitable. Therefore, a document security system has been developed to enhance protection in document management. This paper describes the overview and development status of the security system, integrated with PLMS, which aims at preventing illegal access and inadvertant leakage of the technology information.

  • PDF

A Study on Feminism in the Life and Literature of Ding Ling (딩링(丁玲)의 삶과 문학에 나타난 여성주의 고찰)

  • Lim, Tae-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.175-182
    • /
    • 2019
  • China, more than any other countries in the world shared similar ideological system with Korea historically. That is confucian patriarchy, which later combined with socialism and capitalism respectively. Therefore, the hardship that modern chinese women had to go through in the course of great social changes would provide meaningful cross cultural insights in various women issues in Korea. Thus this study attempts to focus on Ding Ling, who is considered to be one of the first women that brought the feminism up in China. One of her early works, and from Yan'an days were analyzed to mirror current feminist movement.

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

Legal and Institutional Issues and Improvements for the Adoption and Utilization of Artificial Intelligence in Government Services (정부서비스에서의 인공지능 도입 및 활용을 위한 법제도적 쟁점과 개선과제)

  • BeopYeon Kim
    • Journal of Information Technology Services
    • /
    • v.22 no.4
    • /
    • pp.53-80
    • /
    • 2023
  • Expectations for artificial intelligence technology are increasing, and its utility value is growing, leading to active use in the public sector. The use of artificial intelligence technology in the public sector has a positive impact on aspects such as improving public work efficiency and service quality, enhancing transparency and reliability, and contributing to the development of technology and industries. For these reasons, major countries including Korea are actively developing and using artificial intelligence in the public sector. However, artificial intelligence also presents issues such as bias, inequality, and infringement of individuals' right to self-determination, which are evident even in its utilization in the public sector. Especially the use of artificial intelligence technology in the public sector has significant societal implications, as well as direct implications on limiting and infringing upon the rights of citizens. Therefore, careful consideration is necessary in the introduction and utilization of such technology. This paper comprehensively examines the legal issues that require consideration regarding the introduction of artificial intelligence in the public sector. Methodological discussions that can minimize the risks that may arise from artificial intelligence and maximize the utility of technology were proposed in each process and step of introduction.

An Evaluation of Academic Institutional Repositories in Ghana

  • Kumah, Mariyama Abdulai;Filson, Christopher Kwame
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.1
    • /
    • pp.67-83
    • /
    • 2022
  • This study aims to evaluate some academic institutional repositories (IRs) in Ghana. Data were collected using observation and interview methods by examining the various websites of seven (7) selected academic institutional repositories in Ghana. The findings revealed that the University of Ghana, Legon, leads records count of the seven Institutional Repository (IRs) examined. Dspace was the prioritized software for managing and preserving the digital contents of these IRs. Theses, dissertations and research articles were the leading contents deposited on the IRs. The majority of the IRs have incorporated RSS (Rich Site Summary or Really Simple Syndication) feeds on their IRs with few using other Web 2.0 features. English was the only interface language used on all the IRs. From the interview, the findings revealed that most of the faculty members did not use the IR very often and 9(42.9) also indicated that, they have never deposited their materials on the IR. Faculty members again indicated that, inadequate ICT connectivity and infrastructure, unreliable power supply, Copyrights and intellectual rights, financial constrain, inadequate advocacy and training on the importance of IRs to faculty and users were the major challenges of academic libraries in operating IRs in Ghana.

A Study on the Characteristics of Companies Using Technologies of the 4th Industrial Revolution in Response to Global Competition (글로벌 경쟁에 대응한 4차 산업혁명 기술 활용의 기업 특성 연구)

  • Jung-Hwan Cho;Tae-Hwang Kim
    • Korea Trade Review
    • /
    • v.46 no.2
    • /
    • pp.355-368
    • /
    • 2021
  • The purpose of this study is to analyze the factors affecting innovation activities related to the introduction of the 4th Industrial Revolution technology for Korean firms faced to the severe global trade and competition environments. This paper conducted an empirical analysis using the 'The Survey of Business Activities' distributed by the Statistics Korea in 2019. According to the results of the analysis, it was found that the firm size, labor cost, R&D, and intellectual property rights had a significant influence on the firms' adoption of the 4th industrial revolution technology. It was also found that the dummy variables such as strategic alliance between companies, review of entry into a new business, transfer of main business operations, and holding of subsidiaries had statistically significant effects on innovation activities. In addition, this paper showed that the firm characteristics had impacts on innovation activities of firms by the 4th industrial revolution technology type. In order for Korean firms to adapt to the challenges by the 4th Industrial Revolution, it is important to provide policy support and an environment in line with the characteristics of the firms.

Characteristics and Implications of Sports Content Business of Big Tech Platform Companies : Focusing on Amazon.com (빅테크 플랫폼 기업의 스포츠콘텐츠 사업의 특징과 시사점 : 아마존을 중심으로)

  • Shin, Jae-hyoo
    • Journal of Venture Innovation
    • /
    • v.7 no.1
    • /
    • pp.1-15
    • /
    • 2024
  • This study aims to elucidate the characteristics of big tech platform companies' sports content business in an environment of rapid digital transformation. Specifically, this study examines the market structure of big tech platform companies with a focus on Amazon, revealing the role of sports content within this structure through an analysis of Amazon's sports marketing business and provides an outlook on the sports content business of big tech platform companies. Based on two-sided market platform business models, big tech platform companies incorporate sports content as a strategy to enhance the value of their platforms. Therefore, sports content is used as a tool to enhance the value of their platforms and to consolidate their monopoly position by maximizing profits by increasing the synergy of platform ecosystems such as infrastructure. Amazon acquires popular live sports broadcasting rights on a continental or national basis and supplies them to its platforms, which not only increases the number of new customers and purchasing effects, but also provides IT solution services to sports organizations and teams while planning and supplying various promotional contents, thus creates synergy across Amazon's platforms including its advertising business. Amazon also expands its business opportunities and increases its overall value by supplying live sports contents to Amazon Prime Video and Amazon Prime, providing technical services to various stakeholders through Amazon Web Services, and offering Amazon Marketing Cloud services for analyzing and predicting advertisers' advertising and marketing performance. This gives rise to a new paradigm in the sports marketing business in the digital era, stemming from the difference in market structure between big tech companies based on two-sided market platforms and legacy global companies based on one-sided markets. The core of this new model is a business through the development of various contents based on live sports streaming rights, and sports content marketing will become a major field of sports marketing along with traditional broadcasting rights and sponsorship. Big tech platform global companies such as Amazon, Apple, and Google have the potential to become new global sports marketing companies, and the current sports marketing and advertising companies, as well as teams and leagues, are facing both crises and opportunities.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Digital Barrier-Free and Psychosocial Support for Students with Disabilities in Distance Learning Environments

  • Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.15-24
    • /
    • 2022
  • The article clarifies the conditions for information, digital and educational accessibility for higher education seekers with disabilities in terms of distance learning caused by quarantine restrictions. It is established that such conditions are regulated by international and Ukrainian legal documents (The Standard Rules on the Equalization of Opportunities for Persons with Disabilities, Convention on the Rights of Persons with Disabilities, Sustainable Development Goals, Law of Ukraine "On Education", Law of Ukraine "On Higher Education", Strategy for the Development of Higher Education in Ukraine 2021-2031, Development Strategy areas of innovation for the period up to 2030, Development strategy of the sphere of innovation activity for the period up to 2030). As a part of information barrierlessness, Higher Education Institutions (HEI) should provide access to information in various formats and using technologies, in particular Braille script, large-type printing, audio description (audio descriptive commenting), sign language interpretation, subtitling, a format suitable for reading by screen access programs, formats of simple speech, easy-to-read formats, means of alternative communication. The experience of Pavlo Tychyna Uman State Pedagogical University is described. In particular, special attention is paid to the study of sign language: in view of this, the initiative group implemented the project "Learning to hear and overcome social isolation together" with the financial support of the British Council in Ukraine. Within the framework of digital accessibility, the official website of the Faculty of Social and Psychological Education has been adapted for the visually impaired in accordance with WCAG 2.0 World Standards. In 2021, Pavlo Tychyna Uman State Pedagogical University implemented the project "Cultural, Recreational and Tourist Cherkasy Region: Inclusive Social 3D Map" funded by the Ukrainian Cultural Foundation; a site with available content for online travel in the region to provide barrier-free access to the historical and cultural heritage of Cherkasy region was created. Educational accessibility is achieved by increasing the number of people with special educational needs, receiving education in inclusive groups; activities of the Center for Social and Educational Integration and Inclusive Rehabilitation Social Tourism "Bez barieriv" ("Without barriers"); implementation of a research topic for financing the Ministry of Education and Science of Ukraine: "Social and psychological rehabilitation of children and youth with special educational needs by means of inclusive tourism"; implementation of the project "Social inclusion of distance educational process"; development of information campaigns to popularize the ideas of accessibility, the need for its implementation, ongoing training programs and competitions, etc.

A Study of the Research the Right to be Forgotten from 2010 (잊힐 권리에 관한 연구동향 분석: 2010년 이후 국내 연구를 중심으로)

  • Shim, Mina
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1073-1084
    • /
    • 2016
  • The purpose of this study is to present the correct direction of research in related fields by analyzing the trends in the domestic study right to be forgotten. In this study, the final selection of 80 pieces of research papers in various disciplines to search for the study and were analyzed by setting the seven criteria and three research questions. Results, notice that significantly increase the amount of research around the social sciences, starting with the EU rules(draft) has been published in 2012, and around the problem navigating the Law oriented research actively done through a literature review and legal research methods can. Intensive study of the protected rights and the conflict in time towards the latter subject was also increased. The right to be forgotten when considering that big data, digital information such diverse and complex technical issues (service), which still lacks support the implementation of the rights ithil research is desperately needed to know the future with the realization that the scope and research methods. The purpose of this study is to present the research direction of the limits intended for domestic research, but realize effective right to be forgotten by future foreign comparative analysis.