• Title/Summary/Keyword: 권리에 기반한 접근

Search Result 11, Processing Time 0.062 seconds

A View on the Guarantee of Cultural Right of the Disabled (장애인의 문화적 권리 보장에 대한 소고)

  • Lee, Mun-Hwa
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.267-274
    • /
    • 2014
  • The culture is an integral factor when we deal with the quality of life of members of society, and the cultural right is accepted as the basic right. However, the cultural right of the disabled in our society stays in the conditions of the discrimination and alienation by social prejudices and barriers against people with disabilities, and that results from the lack of understanding as a right. The aim of this study is to further raise awareness about the cultural right of the disabled as the basic human right, make it clear to be a universal right based on that, and insist on implementing 'Affirmative Action' for actualizing the disabled's cultural right to equality. The political measures derived from this study to guarantee and realize the cultural right of the disabled are as follows. First, the target extent of cultural voucher system should be expand to not recipients of national basic livelihood guarantees and near poverty groups, but all the disabled. Second, to take full charge of the cultural support of the disabled as a independent organization, it is necessary to establish Ministry of Culture, Sports and Tourism-affiliated 'Bureau of Culture for Persons with Disabilities'. Third, the nationwide survey on cultural activities and desires of the disabled periodically is required.

Legal Issues in Protecting and Utilitizing Medical Data in United States - Focused on HIPAA/HITECH, 21st Century Cures Act, Common Law, Guidance - (미국의 보건의료데이터 보호 및 활용을 위한 주요 법적 쟁점 -미국 HIPAA/HITECH, 21세기 치료법, 공통규칙, 민간 가이드라인을 중심으로-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.117-157
    • /
    • 2021
  • This research reviewed the HIPAA/HITECH, 21st Century Cures Act, Common Law, and private Guidances from the perspectives in protecting and utilitizing the medical data, while implications were followed. First, the standards for protection and utilization are relatively clearly regulated through single law on personal medical information in the United States. The HIPAA has been introduced in 1996 as fundamental act on protection of medical data. Medical data was divided into personally identifiable information, non-identifying information, and limited dataset under HIPAA. Regulations on de-identification measures for medical information, objects for deletion of limited data sets, and agreement on prohibition of data re-identification were stipulated. Moreover, in the 21st Century Cures Act regulated mutual compatibility for data sharing, prohibition of data blocking, and strengthening of accessibility of data subjects. Common Law introduced comprehensive consent system and clearly stipulates procedures. Second, the regulatory system is relatively simplified and clearly stipulated in the United States. To be specific, the expert consensus and the safe harbor system were introduced as an anonymity measure for identifiable medical information, which clearly defines the process while increasing trust. Third, the protection of the rights of the data subject is specified, the duty of explanation is specified in detail, while the information right of the consumer (opt-out procedure) for identification information is specified. For instance, the HHS rule and FDA regulations recognize the comprehensive consent system for human research, but the consent procedure, method, and requirements are stipulated through the common rule. Fourth, in the case of the United States, a trust-based system is being used throughout the health and medical data legislation. To be specific, Limited Data Sets are allowed to use in condition to the researcher's agreement to prohibit re-identification, and de-identification or consent process is simplified under the system.

Human Rights-based Approach toward International Development Cooperation and Canada's ODA Accountability Act (국제개발협력의 인권적 접근과 캐나다 ODA책무법)

  • Soh, Hyuk-Sang
    • International Area Studies Review
    • /
    • v.15 no.2
    • /
    • pp.403-425
    • /
    • 2011
  • Canada became the first OECD/DAC member state that legislated the ODA Accountability Act in 2008, which prescribe Canada ODA policies to meet the guidelines and norms of international human rights while other OECD/DAC member states was just emphasizing the importance of abiding by the international human rights norms. Paying attention to the Canadian case, this article critically examines under what structural environments and process this Act was passed. This article argues that the legislation of the ODA Accountability Act is closely related with Canada's international position as middle power and diplomatic strategies. Bring up the human security issues as a niche market, Canada demonstrates the characteristics of middle power state by emphasizing human rights agenda as new foreign policy strategies. Reflecting on the negative outcomes from neoliberal aid policy of structural adjustment and promoting the new aid norms in post cold war era would also help foster the enabling environment for the value-oriented aid policies and enactment of the Accountability Act. Civil society organizations were also playing catalyst role in constructing Canada's state identity of human rights defender.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.

A Case Study of Child·Youth Friendly Cities Development (아동·청소년 친화도시 조성 사례연구)

  • Kim, HeeJoo;Seo, Jeong-A
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.584-599
    • /
    • 2020
  • This study aimed to explore goals and development process of Child·youth Friendly Cities certified by UNICEF Korea and to provide a research basis for promotion and development of Child·youth friendly cities in Korea. Researchers conducted in-depth interviews with experts in two cities designated as UNICEF Child·youth Friendly Cities in early days. The findings showed that in order to successfully build and maintain friendly cities for children and youth, active interest and efforts of local governors and government officials for promoting friendly cities and policy enforcement based on four principles of child rights were required as prerequisite. In relation to managing Child·youth friendly cities, two cities selected as cases of this study provided universal social welfare programs for children and youth and expanded after-school care services for local students. Moreover they tried to promote decision making and protect rights of children and youth by allowing them to participate in community programs. The important distinctions of these cities were that they established a department exclusively for children and youth and closely cooperated with experts in private sectors. However, participants agreed that there should be more comprehensive and multilateral approach for building Child·youth friendly cities, adoption of incentive system for certification of Child·youth friendly cities and more active promotion of the UNICEF project. In conclusion, the researchers proposed policy implications.

MPEG-21 Terminal (MPEG-21 터미널)

  • 손유미;박성준;김문철;김종남;박근수
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.410-426
    • /
    • 2003
  • MPEG-21 defines a digital item as an atomic unit lot creation, delivery and consumption in order to provide an integrated multimedia framework in networked environments. It is expected that MPEG-21 standardization makes it Possible for users to universally access user's preferred contents in their own way they want. In order to achieve this goal, MPEG-21 has standardized the specifications for the Digital Item Declaration (DID). Digital Identification (DII), Rights Expression Language (REL), Right Data Dictionary (RDD) and Digital Item Adaptation (DIA), and is standardizing the specifications for the Digital Item Processing (DIP), Persistent Association Technology (PAT) and Intellectual Property Management and Protection (IPMP) tot transparent and secured usage of multimedia. In this paper, we design an MPEG-21 terminal architecture based one the MPEG-21 standard with DID, DIA and DIP, and implement with the MPEG-21 terminal. We make a video summarization service scenario in order to validate ow proposed MPEG-21 terminal for the feasibility to of DID, DIA and DIP. Then we present a series of experimental results that digital items are processed as a specific form after adaptation fit for the characteristics of MPEG-21 terminal and are consumed with interoperability based on a PC and a PDA platform. It is believed that this paper has n important significance in the sense that we, for the first time, implement an MPEG-21 terminal which allows for a video summarization service application in an interoperable way for digital item adaptation and processing nth experimental results.

Measuring method of personal information leaking risk factor to prevent leak of personal information in SNS (SNS에서 개인정보유출방지를 위한 개인정보 유출위험도 측정 방법)

  • Cheon, Myung-Ho;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1199-1206
    • /
    • 2013
  • SNS is relationship based service and its users are increasing rapidly because it can be used in variety forms as penetration rate of Smartphone increased. Accordingly personal information can be exposed easily and spread rapidly in SNS so self-control on information management, right to control open and distribution of own personal information is necessary. This research suggest way of measuring personal information leaking risk factor through personal information leaking possible territory's, based on property value and relationship of personal information in SNS, personal information exposure frequency and access rate. Suggested method expects to used in strengthening self-control on information management right by arousing attention of personal information exposure to SNS users.

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

Analyzing Domestic Research Trends on Disclosure of Information By Comparing Major Academic Disciplines (주요 학문분야 비교를 통한 국내 정보공개 연구동향 분석)

  • Na-yun Bae;Hyo-Jung Oh
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.2
    • /
    • pp.295-316
    • /
    • 2024
  • Analyzing research trends is essential for the sustainable development of a discipline and is important for understanding the value of prior research and laying the groundwork for subsequent research. This study aims to draw implications for the future direction of convergence research on the disclosure of information from various disciplines by comparing and analyzing the trends in disclosure of information research in Korea. For this purpose, we analyzed the publication frequency of information disclosure papers listed in the Korea Citation Index (KCI) from 2002 to 2023 and the publication trend by discipline as a time series. In addition, we compared the keyword relationships and specialized research topics of each discipline by applying network analysis and LDA topic modeling techniques to the names and keywords of papers in law, public administration, and library and information science. As a result of the analysis, the law focuses on legal regulations and policy improvement, public administration focuses on changing social needs and administrative operation methods, and LIS focuses on practical approaches to record management and disclosure of information. Based on this, future research directions include combining policy research in law with social change research in public administration and developing realistic policies and operational guidelines from the practical perspective of LIS. Such convergent research will enable the systematic and efficient implementation of disclosure of information systems, contributing to the guarantee of the public's right to know and the enhancement of state transparency.

A Proposal for Archives securing Community Memory The Achievements and Limitations of GPH Archives (공동체의 기억을 담는 아카이브를 지향하며 20세기민중생활사연구단 아카이브의 성과와 과제)

  • Kim, Joo-Kwan
    • The Korean Journal of Archival Studies
    • /
    • no.33
    • /
    • pp.85-112
    • /
    • 2012
  • Group for the People without History(GPH) was launched at September 2002 and had worked for around five years with the following purposes; Firstly, GPH collects first-hand data on people's everyday lives based on fieldworks. Secondly, GPH constructs digital archives of the collected data. Thirdly, GPH guarantees the accessibility to the archives for people. And lastly, GPH promotes users to utilize the archived data for the various levels. GPH has influenced on the construction of archives on everyday life history as well as the research areas such as anthropology and social history. What is important is that GPH tried to construct digital archives even before the awareness on archives was not widely spreaded in Korea other than formal sectors. Furthermore, the GPH archives proposed a model of open archives which encouraged the people's participation in and utilization of the archives. GPH also showed the ways in which archived data were used. It had published forty seven books of people's life histories and five photographic books, and held six photographic exhibitions on the basis of the archived data. Though GPH archives had contributed to the ignition of the discussions on archives in various areas as leading civilian archives, it has a few limitations. The most important problem is that the data are vanishing too fast for researchers to collect. It is impossible for researchers to collect the whole data. Secondly, the physical space and hardware for the data storage should be ensured. One of the alternatives to solve the problems revealed in the works of GPH is to construct community archives. Community archives are decentralized archives run by people themselves to preserve their own voices and history. It will guarantee the democratization of archives.