• Title/Summary/Keyword: right identity

Search Result 121, Processing Time 0.023 seconds

The Linguistic Methodology of Korean Linguistics : based on the comprehension of the historical inquiry (국어학의 언어학적 방법 -연구사적 이해를 중심으로-)

  • Kwang, Chung
    • Lingua Humanitatis
    • /
    • v.5
    • /
    • pp.37-53
    • /
    • 2003
  • In this paper I have considered the subject related with 'the identity of Korean linguistics.' When I have pondered upon the subject I found that all the researches should not be regarded as a part of Korean linguistics only because they followed the scientific methodology. Moreover, it isn't right to accept any of the studies of Korean linguistics only because they relied on the tenet of western linguistic methodology. Although till 1960's various western linguistic methods were introduced to Korean scholars and applied to account for Korean language, abruptly, since 1970's, most theories have inclined to follow tendency of American linguistic trend. Pupils who want to study modem linguistic theories prefer to study at the universities of America rather than other countries in Europe. However, it is necessary to blow that the history of American linguistics isn't really as long as that of European nations and that the humanities has developed fur a long time since the Greek period. If we attempt to contemplate the procedure of the invention of Korean alphabetic system (Hun-Min-Jung-Um) it will be easy to find the fact that the theoretic approaches used to observe and analyze Korean language in 15th century are as good as the most up-to-date theories which have been introduced recently. Therefore, I tried to show that the historical awareness of linguistic theories deserves special emphasis in order to understand the reality of Korean linguistics correctly.

  • PDF

A Study on the Scientific Status of MIS (경영정보학의 학문적 위상에 관한 연구)

  • Oh, Jae-In
    • Asia pacific journal of information systems
    • /
    • v.8 no.3
    • /
    • pp.181-194
    • /
    • 1998
  • The inability of the management information systems (MIS) field to progress as a scientific discipline has been attributed to the lack of systematic research and a cumulative tradition, an identity crisis, and the poverty of scientism. While research on the status of MIS is very important in order to enhance the field as a scientific discipline, few have investigated this issue. Following Thomas Kuhn's idea of paradigm, this paper studies other fields to investigate when they progressed, when they did not, and why. After research paradigm was broken down into technology-push and demand-pull types, a model on the science life cycle was developed in an effort to explain the path how a science has progressed. A test of this model in the fields of physics and chemistry with an old historial background reveals that the scientific progress in the area of demand-pull is more desirable if this progress turns out to be in the right direction. An application of the model to the MIS field shows that the research paradigm in this field is mainly of technology-push. In order to shift this paradigm toward the demand-pull area, this paper suggests the research on the relationship among MIS subfields and the adoption of appropriate reference disciplines.

  • PDF

Public Key Encryption with Equality Test for Heterogeneous Systems in Cloud Computing

  • Elhabob, Rashad;Zhao, Yanan;Sella, Iva;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4742-4770
    • /
    • 2019
  • Cloud computing provides a broad range of services like operating systems, hardware, software and resources. Availability of these services encourages data owners to outsource their intensive computations and massive data to the cloud. However, considering the untrusted nature of cloud server, it is essential to encrypt the data before outsourcing it to the cloud. Unfortunately, this leads to a challenge when it comes to providing search functionality for encrypted data located in the cloud. To address this challenge, this paper presents a public key encryption with equality test for heterogeneous systems (PKE-ET-HS). The PKE-ET-HS scheme simulates certificateless public encryption with equality test (CLE-ET) with the identity-based encryption with equality test (IBE-ET). This scheme provides the authorized cloud server the right to actuate the equivalence of two messages having their encryptions performed under heterogeneous systems. Basing on the random oracle model, we construct the security of our proposed scheme under the bilinear Diffie-Hellman (BDH) assumption. Eventually, we evaluate the size of storage, computation complexities, and properties with other related works and illustrations indicate good performance from our scheme.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

A Study on the Advocacy System for Service User in Social Welfare (사회복지에서의 이용자 지원을 위한 권리옹호(Advocacy) 시스템에 대한 고찰)

  • Lee, Myoung-Hyun
    • Korean Journal of Social Welfare
    • /
    • v.56 no.2
    • /
    • pp.29-52
    • /
    • 2004
  • Social welfare has transformed from a provider-centered welfare into a user-centered welfare. This trend have to increase the right to welfare and convenience for users. If the goal of social welfare guaranteed the respecting man's life and dignity, we had not regarded service users as the weak in the welfare system. The reinforcement of service users as the reconfirmation of welfare user's identity, mistreatment and violation of another's rights, self-determination must have the advocacy system. The advocacy for social welfare is the activity for benefit of individual, group, and community, and, protection, guarantee and maintenance of client's right. However, the client is hard to realization of right. therefore We have to support the activity for advocacy. The advocacy take aim the basic need of life and need the system for life support and safeguard client's rights. The mission of the advocacy for welfare service user is to advance the dignity, equality, self-determination, and expressed choices of individuals. We promote, expand, protect and seek to ensure the human and legal rights of individuals through the provision of information and advocacy. The advocacy system will carry out this mission in partnership with welfare service users. The goals for the advocacy system are organized into the following focus areas, which are not listed in order of priority: the majority guardian system and the support activity for service users, a predicament solution activity, service assessment, informed concent system.

  • PDF

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Characteristics of Labor Market and Spatial Networks in Daedeok Science Town as Locality, Korea (로캘러티로서 대덕연구단지의 노동시장 특성과 공간적 네트워크)

  • Han, Ju-Seong
    • Journal of the Korean association of regional geographers
    • /
    • v.7 no.2
    • /
    • pp.35-54
    • /
    • 2001
  • The construction of Daedeok Science Town, located in Yuseong ward of Daejeon metropolitan city, began in the early 1970s. It started out as a national project to form an agglomeration of the major central government research institutions. Since that time Daedeok Science Town has also attracted private research institutions, mainly during the 1900s. This study geographically analyzes this research institutions to clarify the regional identity of Daedeok Science Town through an integrated approach of existing new regional geography approach, which is characteristics of labour market as the regional pattern of its laborers' residences, spatial labour division, its research network with other institutions, and networks of university, research institution, and corporations, through the spatial spread of intellectual right of property and through network of technology business incubator relationship with spin offs which is appeared to spatial interaction. The results of the study are as follows: First of all, Daedeok Science Town was not only self-sustenance with marketing garden of agricultural regions in the suburb of Daejeon city but also was consign of agricultural products to Daejeon city before 1972. Since that time, the identity of Daedeok Science town has been formed by externally factors of the science development, by the local decentralization of population and public offices in Seoul metropolitan area in terms of the world economy system, and by the internally accessibility maximization of the central location in Korea between 1992 and 1999. On the part of Daedeok Science Town it has some merits of in-migration from nation-wide, and of mother city's Daejeon. Lastly at the period of the venture business beginning after 1999, the role of institution, developing the existing high technology, made great contribution to an attraction of ventures business to here in need of high technology industry growth, including knowledge-based industry in the informated society. On these bases, Daedeok Science Town seems to grow spontaneously as a science park.

  • PDF

A Study on the Authority of Private Security Personnel (민간경비원의 권한에 대한 연구)

  • Choi, Sun-Woo
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.177-199
    • /
    • 2009
  • In this study, I would try to observe the scopes and related matters of the authority of private security personnel based on the basic discussion about the identity of private security. Everybody knows, the problems of private personnel have been mainly discussed in the relations of the public police. Because the roles of private personnel are similar to the police, and in the perspective of the law, private security are regulated by the police. When we compared with the police, the scopes of authorities of private personnel are considered in several points. First, most private personnel are just only 'citizen', so they can exercise the authority as citizen. It can include self-defense, self-help. flagrante delicto arrest. But when discuss the authority in the scopes of a possessionary right or managemental right, the authority of private personnel can be extended somewhat. Moreover, when private personnel are delegated by the special laws, their authority are extended much more. Finally, when the whole authority are delegated by such as the privatization, private personnel authority can be nearly same to the police. But, it can be considered that the degrees of the delegated authority are flexible. And the exercise of the authority must be performed in the limit that not infringe the individual freedom and rights. It seems to me that the degrees of fairness in use of authorities and it's a permitted limit are set forth a premise not only the legitimate base but also judicial judgement. Therefore, the attitudes of the courts related the exercise of authority are very important. And the growth of private security and the extension of authority followed are inevitably accompany the various problems of responsibility, so it must be considered about that in many perspectives.

  • PDF

Human Rights-based Approach toward International Development Cooperation and Canada's ODA Accountability Act (국제개발협력의 인권적 접근과 캐나다 ODA책무법)

  • Soh, Hyuk-Sang
    • International Area Studies Review
    • /
    • v.15 no.2
    • /
    • pp.403-425
    • /
    • 2011
  • Canada became the first OECD/DAC member state that legislated the ODA Accountability Act in 2008, which prescribe Canada ODA policies to meet the guidelines and norms of international human rights while other OECD/DAC member states was just emphasizing the importance of abiding by the international human rights norms. Paying attention to the Canadian case, this article critically examines under what structural environments and process this Act was passed. This article argues that the legislation of the ODA Accountability Act is closely related with Canada's international position as middle power and diplomatic strategies. Bring up the human security issues as a niche market, Canada demonstrates the characteristics of middle power state by emphasizing human rights agenda as new foreign policy strategies. Reflecting on the negative outcomes from neoliberal aid policy of structural adjustment and promoting the new aid norms in post cold war era would also help foster the enabling environment for the value-oriented aid policies and enactment of the Accountability Act. Civil society organizations were also playing catalyst role in constructing Canada's state identity of human rights defender.

A Biographical Study of Social Exclusion Experiences - Focused on the Physical and Cerebral Palsy Disabled - (장애인의 사회적 배제 경험에 대한 생애사 연구 -지체와 뇌병변 장애인 중심으로-)

  • Shin, Yu-Ri
    • Korean Journal of Social Welfare
    • /
    • v.64 no.2
    • /
    • pp.299-323
    • /
    • 2012
  • The purpose of this study is to understand social exclusion experiences with the disabled through a biographical study. It is analysed the interview date conducting an interview about 10 focused on the physical and cerebral palsy disabled with social exclusion experiences. The results show that it is multi-social exclusion including the inequality of approach opportunity of education, labor, education, medical, social participation, information, social service, space, health etc. It shows their life neglected and marginalized resulted from not providing social right as citizenship. And their social relationship is isolated by social exclusion and Other-directed identity is to be shaped in accordance to the method to define as regulated social ideals. Also, there is their painful and heavy life bound with double risky factors of disability and poverty. They share common historical experiences and social events impacted on their recognition and value among participants generation in biographical narrative. On the other hand, their life is reconstructed according to each their resource and standard to interpreter and evaluate on it. It suggests political and clinical implications in order to overcome the disabled's social exclusion, which is based on practical and vivid experiential dates from the participants.

  • PDF