• Title/Summary/Keyword: public Information disclosure system

Search Result 63, Processing Time 0.03 seconds

A Study on 50 states' Open Meeting Act in the United States (미국 50개 주 회의공개법 연구)

  • Choi, Jeong Min;Kim, You-seung
    • The Korean Journal of Archival Studies
    • /
    • no.57
    • /
    • pp.35-73
    • /
    • 2018
  • This study aims to elucidate the implications for 20 years of the establishment of the information disclosure law by analyzing contents of the public regulations of 50 states of the United States. For the purpose, it looks at the general outline of the open meetings law of the 50 states, including the requirements and procedure of the advance notification of the meeting, and the protest procedure and penalties for the violation of the law. As a result of analysis, under the law, public meetings should announce their schedule and agenda in advance, and minutes of meetings and recording of meetings should be accessible to citizens. Furthermore, a person who violates the law for opening meetings could be fined or imprisoned. The implications for the establishment of the Open Meetings Act in Korea are as follows: First, the open meeting system starts with the appropriate period and method of advance notice of meeting holding. Second, the substantive contents of the advance notification guarantee the effectiveness of the meeting disclosure system. Third, the method and subject of advance notification should be as wide and diverse as possible. Fourth, all decisions of the meeting that violate the law are null and void. Fifth, a system should be set up so that any citizen could easily raise objections to the violation of the law. Sixth, the person who violates the law should be held responsible. Lastly, citizen access to minutes, recordings as well as comprehensive meeting minutes writing including attendees, agendas, and ballots should be guaranteed.

Improvement Plans of the Parliamentary Inspection System in the Information Society

  • Park, Jong-Ryeol;Lee, Young-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.181-190
    • /
    • 2019
  • Today, in the information society, since the government administration of all countries places importance on clarity and efficiency, the authority concentration of the administration is inevitable. Therefore, the Parliament, which is a legislative body, is at a time when the policy control function to check and monitor it is becoming more important. In particular, due to the emergence of parliamentary democracy, in the reality that the people must elect representatives and represent their own opinions, the parliamentary inspection system is very valuable in that it satisfies the right of the people to know and ultimately enables the people to democratically control the administration. The role of the Parliament moves from the inherent legislative function to the information collection and disclosure of government administration, discussion and resolution of political issues, and observation and supervision of the administration. And it can be seen as the global trend. As a result of this trend, status and role of the National Assembly is being strengthened from the legislative body to the control agency of government administration. Thus, the most substantive authority of Article 61 of the Constitution can be deemed the parliamentary inspection system. The parliamentary inspection system is a system that let exercise the legislation, budget, and authority to control of state administration by identify the challenges and policy implementation of each country's institutions through the audit of the executive administration's overall government administration performance outside the National Assembly. However, due to the amendment of Constitution in 1988, the parliamentary inspection right and investigation of state administration right had reinstated and the parliamentary inspection system, which is being implemented annually, is the 31st year of the year in 2019. However, the general evaluation of the public is negative and insufficient time for inspections, lack of sanctions on nonattendance witnesses, excessive data submission, and refusal to submit materials by the administration were pointed out as the problem. Therefore, in this paper, the researcher tries to point out the overall problems of the parliamentary inspection system and to summarize the effective improvement plans.

A Research on the Effectiveness of the Vulnerability Detection Against Leakage of Proprietary Information Using Digital Forensic Methods (디지털 포렌식 기법을 통한 기업 정보유출에 대한 취약점 탐지 효율성에 관한 연구)

  • Park, Yoon-Jae;Chae, Myung-Sin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.464-472
    • /
    • 2017
  • In the ICT (Information and Communication Technology) convergence security environment, a lot of companies use an external public web system for the external disclosure and sharing of product information, manufacturing technology, service manualsand marketing materials. In this way, the web system disclosed on the Internet is an important aspect of cyber security management and has an always-on vulnerability requiringan information protection solution and IT vulnerability checks. However, there are limits to vulnerability detection management in anexternal environment. In this study, in order to solvethese problems, we constructed a system based on digital forensics and conducted an empirical study on the detection of important information in enterprises by using forensic techniques. It was found thatdue to the vulnerability of web systems operated in Korea and overseas, important information could be revealed,such as the companies' confidential data and security management improvements. In conclusion, if a system using digital forensic techniques is applied in response to theincreasing number of hacking incidents, the security management of vulnerable areas will be strengthened and the cyber security management system will be improved.

A Study on the Record Usage of the Internal Users of the Local Government in Seoul Metropolitan Area (수도권 기초자치단체 내부 이용자들의 기록 이용에 관한 연구)

  • Kim, Seyoung;Rieh, Hae-young
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.18 no.2
    • /
    • pp.135-161
    • /
    • 2018
  • This study recognized the public servants of the local governments as the principal users of the records centers. It also attempted to identify their records usage behavior and the requirements of record usage so that records and services that meet their needs as the main users would be met. Therefore, the researchers identified through an information disclosure request the highly ranked departments that use records more than the others based on their usage frequency of the records centers and the standard records management system (standard RMS) during the third quarter of 2017. A questionnaire survey was subsequently conducted to the public servants of the local governments in the metropolitan area. The questionnaire identified the users' opinion on general usage behavior, usage of standard RMS, and usage of the records center. Based on the survey results, improvements in the management of the records centers the record management system, and the record services of the local governments were suggested.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

A Study on the State of Classified Records Management in Korea (우리나라의 비밀기록 관리현황에 관한 연구)

  • Seo, Won-Kyoung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.6 no.1
    • /
    • pp.93-112
    • /
    • 2006
  • As information disclosure is actively requested, loopholes of the government's Records Management System have exposed. Important documents of government have been disposed, lost, and closed to the public by the reason that they are 'classified'. This study starts from the recognition of these problems. Researches on classified records are necessary to reveal the historical truth. The purpose of this study is to examine the organization of Records Management System and the management of classified documents of the government institutions. Through the analysis of actual condition of classified records management, it is found that the classified records management is poorly implemented in Korea. This study especially deals with the classified records management system in special records management institutions such as legislative, judiciary, and military agencies. Though this study deals with a specific part of government, it may contribute to improvement of classified records management in government as a whole.

Measures for Enhancing System of Crime Victim's Information Protection (범죄피해자 정보보호법제의 개선방안에 대한 연구)

  • Lee, Kwon Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.175-187
    • /
    • 2016
  • Protection of personal information has significant meaning in current information age. Information of crime victim is one of top in value in that divulgence of the information to perpetrators may threat safety of the victim or cause psychological demage as $2^{nd}$ harm if disclosed to public. Legal system protects the information with scattered statutes including Criminal Procedure Act. Existing studies have been limited to discussion of the single statute without integrated approach. Bearing necessity of the approach in mind, as issues of protection system this research proffers too broad subject of eligible inspection of case document, inactive practice of identity management cards and omission of personal information, and inappropriate punishment on the disclosure or divulgence. After reviewing systems of foreign jurisdictions to get useful implications, this paper suggests several measures with two separate aspect of legal provisions and protection practice.

An Exploratory Study on the Sharing and Application of Public Open Big Data (공공 빅데이터 개방 및 활용 활성화 방안에 대한 연구)

  • Jeon, Byeong-Jin;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.24 no.3
    • /
    • pp.27-41
    • /
    • 2017
  • With the growing interest in the 4th industrial revolution and big data, various policies are being developed for facilitating the use of public open big data, which are leading to a wide range of added values created from use of such data. Despite the expanded requirements for public data disclosure and the legal system improvement, however, the use of public open big data is still limited. According to the literature review, there are studies on policy proposals for the government guiding directions for public open big data, but there is a lack of studies that handle the issue from the users' viewpoint. Therefore, this study aims to analyze the public open data ecosystem in Korea and to analyze public open big data through interviews with the providers (the government and public institutions) and users (private sector companies and citizens). This way, the study finds inhibition factors and facilitation factors, draws out issues and suggests solutions through a causal relationship analysis between each factor. Being a research on finding measures for facilitating both public big data release and use, this study has theoretical implications. In the meanwhile, the derived issues and alternatives provide practical implications also for stakeholders who are planning to facilitate release and use of public open big data.

A Study on the Records of Presidential Impeachment in 2004 in the Public Domain (공공영역의 2004년 대통령 탄핵사건 기록)

  • Oh, Myung-Jin
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.45-78
    • /
    • 2012
  • The significance of Presidential Impeachment in 2004 is subject to interpretations in many different contexts, but its nature as its justice was the constitutional trial by the nation's impeachment system. This study set out to compare and analyze the understanding of the event centered around its nature as "an impeachment event as a public activity" and the records related to it. For that purpose, the study attempted to analyze the impeachment event to understand it as a public activity and examined and analyzed the records of the impeachment event in the public domain through personal visit, phone interview, and request of information disclosure based on the analysis results. An impeachment event as a public activity can be understood as an activity carried out by the National Assembly, which is to issue a motion for impeachment under the norms of the nation's impeachment system, and Constitutional Court, which is responsible for impeachment trial, through their unique rights prescribed in the Constitution. The important subjects of such a public activity included the accused president, the acting presidential system created by the motion for impeachment, and the National Election Commission that provided a decisive ground for impeachment. It was confirmed that the records, which are legal requirements, were well created and have been preserved and managed in the public domain. However, it was difficult to conclude that the records of the impeachment event were thoroughly created in terms of content in relation to affairs as they mainly covered the superficial treatment processes and the results of explicit activities. There was, in particular, the absence of records showing the context of activity.