• Title/Summary/Keyword: infringement

Search Result 549, Processing Time 0.022 seconds

The effects of the operation of an information security management system on the performance of information security (정보보호 관리체계의 지속적인 정보보호 관리과정(PDCA)이 정보보호 성과에 미치는 영향에 관한 실증 연구)

  • Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1123-1132
    • /
    • 2012
  • Many domestic organizations are introducing and operating various information security management systems capable of coping with technical, administrative, and legal issues comprehensively and systematically, in order to prevent various infringement incidents such as personal information disclosure and hacking preemptively and actively. However, empirical analyses regarding the extent to which an information security management system contributes to information security performance have not been fully conducted, even though enterprises and organizations are actively introducing such systems in order to achieve their information security objectives as a part of their organizational management activities in line with their respective business, by investing considerable effort and resources in developing and operating these systems. This approach can be used to apply, develop, and operate the information management system actively within an organization. this study focused on analyzing how each specific phase of the information security management system affects information security performance, compared with previous studies, which generally focus on the information security control item in analyzing information security performance. The information security management system was analyzed empirically to determine how the Security PCDA cycling model affects information security performance.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

A Study of Authors' Moral Rights Infringements Regarding Cinematographic Works and Other Visual Works (음악·영상저작물의 동일성유지권 침해관련 연구)

  • Kang, Sang-Gu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.228-236
    • /
    • 2021
  • This research investigates the causes of infringements related to authors' moral rights which has most conflict among moral rights of authorship, through analysis of judicial precedents and compare whether there subsists any differences in viewpoints between judicial precedent trend and those on behind the scene of broadcast production. Copyright is divided into intellectual property and moral rights of authorship. Right to the integrity of the work is part of moral rights of authorship and produce one content and used in various media. When the edit is needed to fit the organization and advertisement time, advanced consultation from the rightful owner or written consent is needed. However, under the time pressure or ignorance of copyright, the arbitrary edits are made and content is used. This infringes the right of the integrity of the work. When we produce and use cinematographic works and other audiovisual works, there are considerable variablilies stemming from authorship, production cost and program staff. Therefore, prior conscent is needed to acquire and use the copyright in a proper manner. However, due to production-oriented environment and low understanding of the copyright protection, we usually depend on the users' work practices rhather than insufficiency of copyright laws in dealing with the infringement of right to the industry. In conclusion, we need to provide meticulous work manual and to focus on systematic eduction of professional copyright manpower.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

A Comparative Study of Ship Collision Legislation in Korea and China (한국과 중국의 선박충돌법제의 비교법적 연구)

  • Jiancuo, Qi
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.577-586
    • /
    • 2022
  • The increasing trade volume between Korea and China has rapidly expanded the maritime transport between the two countries. However, safety, particularly considering the ship collisions in the Yellow Sea and East Sea waters, has not been fully ensured. These collision accidents in that region endanger traffic safety and the marine environment, moreover, it has the potential to cause legal complexity because Korea and China haver domestic legislation, that are considerably different in some aspects. International conventions and domestic legislation in China provide detailed laws with respect to ship collisions, however, the theory of ship collision infringement still needs to be improved, enriched, and developed. Because these laws are not very clear on the resolution of disputes resulting from ship collisions, we focused on the final judgments by the Supreme Court of China (SPC), and the judicial judgments set by the Maritime Court of China. This study aimed to explore the domestic legislation applicable to disputes related to ship collisions in China, and comparatively investigate the legal provisions of Korea and China on the issue of ship collisions, particularly on the aspect of damage compensation, fault ration, and liability apportionment.

The Awareness and Educational Needs of Some Health Major Students on The Forth Industrial Revolution (4차 산업혁명에 대한 일부 보건계열전공 학생들의 인식과 교육요구도 조사)

  • Lee, Mi-Lim;Lee, Hyo-Cheol
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.3
    • /
    • pp.193-202
    • /
    • 2021
  • The purpose of this study was to examine relation of awareness and education requirement of the 4th industrial revolution in health care students in attempt to provide basic data of determining the principle and education plan. The subject of study were 280 students of health department of H university in Gwangju and analyzed by gender and grade. The female students were positive awareness of the 4th industrial revolution and the level of influence on the major field was highest in lower grade students. The level of negative factors such as generation gap(p<0.05), gap between rich and poor (p<0.01), personal information infringement(p<0.05), decrease in existing jobs(p<0.05), and abuse of artificial intelligence(p<0.05) was highest in male students. In prepration for the 4th industrial revolution, education on bio and medical device(22.2%) was the most desired. The higher positive awareness, the higher educational demand(p<0.001). It is necessary to develop programs and various education to increase positive factors such as the creation of new jobs and improve the quality of life in the era of the 4th industrial revolution.

A Study on the Factors Influencing Student Athletes' Human Rights Abuse Experience -Focusing on the analysis of environment in team, human right in event and human right in sports using logistic regression (학생선수의 인권침해 경험에 영향을 미치는 요인에 관한 연구 -로지스틱 회귀분석을 이용한 팀 분위기, 소속종목 인권의식, 체육계 인권의식에 대한 분석을 중심으로-)

  • Lee, Youn-Young;Lee, Je-Hun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.295-305
    • /
    • 2022
  • This study aimed to present a realistic policy direction to reduce human rights violations by analyzing the mechanisms of its factors affecting the experience of human rights violations for middle and high school student athletes. The method analyzed the response data of 13,205 student athletes through a structured questionnaire using logistic regression analysis. The independent variable consisted of sexual violence, sexual shame, physical violence, verbal violence, bullying, invasion of privacy and learning rights, and unfair leaders' actions related to exercise. As a result of the analysis, first, the team atmosphere, human rights consciousness in their sports and in the sports field were found to have a significant influence on physical and language violence, bullying, privacy and infringement of learning rights. Second, for the experience of sexual violence, the team atmosphere and the level of awareness of human rights violations in the sports community had a significant effect, but the permission of violence in the sports community and human rights consciousness in their sports did not appear as meaningful variables. Third, it was found that the unfair experience related to exercise had a significant effect on the team atmosphere, the overall level of violence in the sports community, and the its awareness of human rights violations in the sports community.

A Study on the Reliability and Validity of the Collection of the Ethnography Method of Service Experience Data - Focusing on I know You_AI Service - (서비스경험데이터의 에스노그라피 방식 수집에 대한신뢰성과 타당성 연구 - I know you_AI 서비스를 중심으로 -)

  • Ahn, Jinho;Lee, Jeungsun
    • Journal of Service Research and Studies
    • /
    • v.10 no.4
    • /
    • pp.43-55
    • /
    • 2020
  • Recently, as the importance of experience data increases, there are many attempts to deal with experience data from a data science perspective. In the case of approaching as a collection method of a quantitative survey method that seeks to quantify numerically such as big data, it is difficult to interpret the value of experience in a wide range, and it is relatively expensive and time consuming, and personal information infringement There is a limit to the analysis due to the risk of However, since ethnography, a procedure for collecting experience data based on qualitative research, is mainly carried out in the natural real environment of future customers from the perspective of users, it is possible to confirm the nature that customers face with a small sample. In addition, it is also easy to interpret the relational dimension of the empirical data. Although the ethnography method of collecting experiential data is economical and efficient, it is important to reduce errors in the collection process because the lack of scientific procedures for the data collection process can be a problem. It is important to secure the validity of whether the correct measurement tool is used for ethnography-based experiential data collection and to secure the reliability of the use of a valid measurement tool and method by accurately selecting the measurement target. From this point of view, it is necessary to verify the reliability of the research method that clearly selects the measurement target and secures the validity for the development of the correct measurement method and tool for the collection of ethnography experience data. Therefore, in this study, a verification study was conducted on the data and methodology cases of the'I know you_AI' service that analyzes the customer experience of self-employed based on the ethnography method of collecting experience data..

The TRC and reformative social unification in the South Africa (남아공의 진실과화해위원회(TRC)와 개혁적 사회통합 -민주주의 이행과정으로서의 과거사정리정책-)

  • Kim, Young Su
    • Journal of International Area Studies (JIAS)
    • /
    • v.12 no.4
    • /
    • pp.67-88
    • /
    • 2009
  • In April, 1995, ANC government was established in South Africa. The Black government set up Truth and Reconciliation Committee in November, 1995. The Committee investigated approximately 50,000 cases for 3years. Through this process, Black and White in SA could be united into one. Finally, the system of racial discrimination, lasting for about 300 years, was abolished. The Committee played a role as a social infra-structure, which was to perform and solidify democracy in SA. Reconciliation, agreement, Participation, equality, Communication, and Reformation of law system were practically implemented by the Committee. Many people evaluate TRC's activity, which had the reformative and democratic character of the object of investigation, investigative criterion, investigative process, and the approval of investigative result. But De Klerk evaluates that TRC retaliated the White with legal. J. Cronin evaluates that TRC transiently change democracy of the South Africa, and many other social movement groups had a negative view about TRC. But the Black and White in South Africa transformed 'discriminated society' into 'united one'. The Committee took the initiative in such a change. The Committee was not an organization needed for the policy, but the committee was the policy itself to change the former society to the new one. Now The ANC government was forwarding TRC's roles and functions to the truth and reconciliation bureau of the Justice Department for further action. The ANC government has to execute some policy for social reconciliation. Firstly, the government needs to build construction social and national system for making close investigation into the White's historical guilt. Secondly, it must be executed to TRC's recommendation pursuit social reform of social infra-structure in the South Africa. Thirdly, The government should execute policy for the Black's right as labors and social member. Lastly, the government must investigate still-remaining historic state violence and infringement of human right for social reconciliation.