• Title/Summary/Keyword: rights information

Search Result 985, Processing Time 0.028 seconds

Protective Way Improvement of a Crime Victim's Rights of Portrait (범죄 피해자의 초상권보호 개선방안)

  • Joen, Chan-Hui
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.286-298
    • /
    • 2009
  • Became large a problem we were productive movement of information became large and occurring to diffusions of development of public media and Internet use. While the Internet became a generalization, public media had more influences and risks, and a crime to abuse anonymity became large in cyber space. In addition, damage is becoming expanded reproduction that infringe of ' crime victim's rights of portrait'. The point that is most important in order to improve these points is recognition regarding the special situation of crime victim, and the ethic consciousness and independent operation regulation and regulation system that these point was taken into consideration in the public media and Internet operation that are an information producer is necessary, and Internet portal shall be included like Internet newspapers to the arbitration object of the Press Arbitration Commission. Also, a legal system regarding personal responsibility shall have for protection of a crime victim's rights of portrait by personal information activity for protection in cyber space. Suggest to a portrait of a crime victim, and an individual and social rights security effort are required for activation regarding an infringement relief system.

The Guarantee of Criminal Victim's Information Rights (범죄피해자의 정보권보장을 위한 방안)

  • Yang, Kyung Kyoo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.137-145
    • /
    • 2013
  • The most important thing in the trial reveal the truth regardess of civil trial or criminal trial. The criminal procedure should be amended to guarantee victims the right to attend court hearings, to receive information about the progress of their case. But the new Criminal Procedure Law 2007 stipulated merely reading right of investigation records after prosecution while reading and printing rights prior to prosecution were not legislated. All sections of the criminal justice process must ensure that the process of dealing with the offender should not increase the distress or add to the problems of victims of crime in secondary victimisation. Reading and printing rights of prior to prosecution should be stipulated at earliest to protect the criminal victims and to prevent the secondary victimisation, The purpose of this study is to practically protect the right of the victims on the criminal procedures.

A Study on the Concepts of Human Rights in IFLA Statements on the Basis of UDHR (세계인권선언서를 기저로 한 IFLA 선언서의 인권 개념 연구)

  • Kim, Seon-Ho
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.4
    • /
    • pp.5-28
    • /
    • 2013
  • This study is to propose the philosophical direction of public library services based on human rights. To accomplish this purpose, this study comparatively analyzed key concepts from 13 statements related to IFLA as well as UDHR with the inductive approach for qualitative data analysis. The result shows that the most important concepts of human right emphasized from IFLA statements are 1) UDHR Article 19: Freedom of opinion and expression, and Freedom of information access, 2) Article 2: No distinction of any kind, Article 12: Privacy, and Article 26: Education, 3) Article 18: Freedom of thoughts, conscience and religion, and Article 27: Cultural life. From this result, this study finally suggests that the concept of human rights should be added to the Korean Library Law.

An Efficient Comparing and Updating Method of Rights Management Information for Integrated Public Domain Image Search Engine

  • Kim, Il-Hwan;Hong, Deok-Gi;Kim, Jae-Keun;Kim, Young-Mo;Kim, Seok-Yoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.57-65
    • /
    • 2019
  • In this paper, we propose a Rights Management Information(RMI) expression systems for individual sites are integrated and the performance evaluation is performed to find out an efficient comparing and updating method of RMI through various image feature point search techniques. In addition, we proposed a weighted scoring model for both public domain sites and posts in order to use the most latest RMI based on reliable data. To solve problem that most public domain sites are exposed to copyright infringement by providing inconsistent RMI(Rights Management Information) expression system and non-up-to-date RMI information. The weighted scoring model proposed in this paper makes it possible to use the latest RMI for duplicated images that have been verified through the performance evaluation experiments of SIFT and CNN techniques and to improve the accuracy when applied to search engines. In addition, there is an advantage in providing users with accurate original public domain images and their RMI from the search engine even when some modified public domain images are searched by users.

A Study on Contents Sharing Mechanism based on Proxy Re-Encryption Scheme using the Smart Card (스마트카드를 이용한 프록시 재 암호화 기법 기반 콘텐츠 공유 메커니즘에 관한 연구)

  • Park, Seung-Hwan;Koo, Woo-Kwon;Kim, Ki-Tak;Mun, Hye-Ran;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.131-141
    • /
    • 2011
  • OMA(Open Mobile Alliance) is one of the most active group about DRM technology in mobile device field. OMA announced an OMA-DRM v 2.1 standardization in 2007. After then OMA announced OMA-SRM(Secure Removable Media) and SCE(Secure Contents Exchanges) that are the extension of OMA-DRM v2.1. In SCE, a user can form user domain to share contents and rights. So the user can share contents and rights with not only the the OMA-DRM v2.1 but also home devices like mobile phones, personal computers and audios. In this paper, we analyze a sharing technology of OMA-DRM and SCE, and then propose key distribution method using proxy re-encryption and smart card to use shared contents and rights.

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

Metabus culture and intellectual property. (메타버스 문화와 지적재산)

  • Seok, yeonseon;Kim, Soo dong;Kim, Deok min;Bae, Shin hoon;Jeong, Hyung won
    • Journal of Integrative Natural Science
    • /
    • v.15 no.1
    • /
    • pp.27-36
    • /
    • 2022
  • Metabus, currently represented by Second Life on the Internet, is the next-generation 3DCG Internet world in which the 2D Internet world has evolved, and has grown as a new ICT culture of mankind that can replace real society with virtual society. As such, the reason why the world of metabus has rapidly expanded is that the era of 3D Internet has arrived due to the evolution of the Internet, which only used information, and the spread of 5G communication in user-participating WEB. However, there are many situations in which laws do not exist in this virtual world and various illegal acts occur. As the Internet culture developed earlier, illegal activities by users began to appear, and as the legal responsibility of Internet providers was discussed, mankind quickly passed the Millennium Copyright Act or introduced new copyright protection measures such as technical protection, transmission rights, and rights management information. Therefore, this paper reviews and studies how to accept and further grow this new metabus culture, including the viewpoint of intellectual property.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

Design and Implementation of Mobile Security System for Content Rights Management in Wireless Internet Environment (무선 인터넷 환경에서 컨덴츠 저작권 보호를 위한 모바일 보안시스템의 설계 및 구현)

  • Kim, Hoo-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1945-1948
    • /
    • 2003
  • 무선 인터넷이 활성화되면서 다양한 형태의 무선 컨텐츠가 상용화되고 있으며, 이와 동시에 불법적인 컨텐츠의 유통이 성행하게 되어 컨텐츠 보안을 위한 디지털 저작권 관리(DRM: Digital Rights Management)시스템이 요구되고 있다. 본 논문에서는 무선 인터넷 환경에서 유통되는 디지털 컨텐츠의 저작권 보호를 위한 모바일 보안 시스템을 제안하였다. 특히, 본 시스템에서 단말의 처리 능력을 고려하여 컨텐츠 부분 암호화 기법을 적용하여 신속한 복호화 수행이 가능하도록 설계하였다. 본 시스템을 적용할 경우 컨텐츠의 권리보호는 물론이며, 제한적인 모바일 디바이스에서 기존보다 신속한 수행이 가능해지는 효과를 기대할 수 있다.

  • PDF

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF