• Title/Summary/Keyword: 이용자보호

Search Result 403, Processing Time 0.024 seconds

The Improvement on the current law about Mutual aid service and information use (상조서비스 및 정보 이용에 관한 현행법상의 개선점)

  • Kim, Ku-Jong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.185-191
    • /
    • 2012
  • The essence of Mutual aid service is looking into the general commerce about its goods and services that is a general viewpoint. Through the contract that the contractor related with the Mutual aid associations and Mutual aid companies. provide the goods and services to future member's demanding point. and members are pay out money, and pay for that on the installment plan. This Mutual aid business had been increased rapidly after 2005, it is expanded huge business, even its scale alone, the cost is estimated at over three trillion won. But because of Mutual aid business's prepayment installment plan, stipulated substance of the Law on hire-purchase systems were more actualized than in the past, but it leave much to be desired. for example, the obligation of explanation to Mutual aid associations and members of Mutual aid company, the consumer protection about the contract of advance received deposit, upward problem of capital, when establish the Mutual aid company etc. in this paper will review these problems and improvement about legal details that for the customers of Mutual aid service and development of Mutual aid industry, and claimed about Mutual aid law's singular legislation.

Self-disclosure and Privacy in the Age of Web 2.0 A Case Study (웹 2.0 시대의 프라이버시 청년 UCC 이용자들의 인식과 실천을 중심으로)

  • Lee, Dong-Hoo
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.556-589
    • /
    • 2009
  • With the advent of the so-called Web 2.0 age, the interconnections of various contents on the web, as well as the user-participatory services from blogs, web-based communities, picture sharing sites, and social networking sites, to the sites for collective knowledge productions, have been further vitalized. As the User Generated Contents(UGCs) are flourishing on the web, they have channeled users' desires for self-expression and social acknowledgement, and yet have created the new kinds of invasion of privacy. This study attempts to look at how the networked individuals' everyday perceptions of privacy have been reconstructed in the age of Web 2.0. By investigating how users have used the UGCs for their sociality on the web and how they have set the boundaries of the private and the public in these public or semi-public disclosures of self-expressions, it has traced the changing perceptions of privacy in everyday communication practices. For this study, it has interviewed Korean youngsters in their 10s and 20s who have grown up with the Internet and have received self-expressions and social communication on the web as everyday activities. Based on their interviews, it inquires into the concurrent notion of privacy and discuss its cultural implications.

  • PDF

A Prepaid System Promotion Policy for the 3G MVNO - Carrier Selection, Interconnection, Number Portability, Prepay, Wholesale Provision - (3G MVNO를 통한 선불요금제 활성화 정책 - 선불요금, 상호접속, 사업자선택, 도매제공 및 번호이동 -)

  • Kim, Byung-Woon
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.88-107
    • /
    • 2011
  • This paper proposes a prepaid system promotion policy for the 3G(WCDMA) MVNO with regard to the newly included paragraphs 3, 4 and 5 of Article 32 (User Protection) and Article 38 (Provision of Wholesale Telecommunications Services) of the Telecommunication Business Act, which was revised on March 22, 2010. As of June 2011, there are only a few prepaid system subscribers to the mobile communications service due to various limitations, including prepay, interconnection, carrier selection, the MVNO policy, and number portability. However, overseas communications service regulatory agencies and service providers are increasingly presenting policies and strategies for mobile prepaid plans, in order to accommodate the various customer demands that are increasing the use of smart phones and data. This paper advances various proposals concerning promotion of the prepaid system by the 3G MVNO under the current Telecommunication Business Act, including separation of the prepaid data system and the mobile network; introduction of a monthly fixed-rate hybrid prepaid system, a top-up system and USIM system; introduction of mobile network carrier selection; differentiated retail discounts between prepaid and post-paid prices; revision of the retail discount policy for wholesale provision; increase in the number of mandatory service providers; and in-depth consideration of the introduction of a number portability policy for the prepaid and post-paid systems.

  • PDF

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

A study of the multicomponent therapeutic recreation function intervention strategy by analysis on the operating condition of the cognitive rehabilitation program in dementia care center

  • Moon-Sook Lee;Byung-Jun Cho;Jae-Sik Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.155-166
    • /
    • 2023
  • This study was conducted with 50 elderly people each (5) participating in the cognitive rehabilitation treatment program at the Dementia Care Center in D City to derive the development direction and contents of a multidimensional therapeutic recreation program and a revitalization plan through analysis of the current status and actual conditions of the cognitive rehabilitation program at the Dementia Care Center. aperture) was selected, and 9 people were selected as the subject of expert group opinion collection. The collected data was SPSS ver. Using the 18.0 statistical program, descriptive statistics and the importance and priority of each component were analyzed by hierarchical structure analysis. First, unlike the needs of users, the cognitive rehabilitation support programs currently being provided are not sufficient and require considerable experience. It was found to be low, and the areas for improvement were the expansion of care and protection facilities and the development of various programs to meet the needs of users. Second, the importance and priority of each component of therapeutic recreation were categorized into 6 major categories: exercise therapy , middle category (16 items) behavior-centered approach to exercise therapy, small category (47 items) strength and brain gymnastics, and silver health gymnastics were the highest. This result shows that a multidimensional program plan that considers the priorities of each area must be made when developing a therapeutic recreation program.

Effect of Health Promotion and Characteristics of Elderly used Day Care Service in Community Health Practitioner's Post (보건진료소의 주간보호실 이용노인의 특성과 건강증진 정도)

  • Jeong, In-Suk;Cho, Yoo-Hyang;Park, Yoon-Chang
    • Journal of agricultural medicine and community health
    • /
    • v.27 no.2
    • /
    • pp.127-136
    • /
    • 2002
  • This study was taken to provide data for the approaches of day care service for the elderly in community health practitioner's post through the study on the utilization rate, characteristics and health promotion that the elderly used the day care services. Data collection used three records that case management in take sheet, dementia check list and ADL record during the one year, from June 21, 2001 to June 30, 2002. During the one year, the elderly used day care services were 119 persons that 26.9% of the total elderly population, 1.5 time per used the elderly, and female elderly(88.9%) more used than male elderly. 39.5%of the elderly user have chronic diseases that was arthritis and hypertension and etc. 41.2% of the elderly users have dementia state that score was $17.39{\pm}7.17$(handicapped elderly), $18.43{\pm}7.36$(healthy elderly), but statistically not significant PADL score was $2.18{\pm}0.55$(handicapped elderly), $2.78{\pm}0.30$(healthy elderly), IADL score was $1.78{\pm}0.51$(handicapped elderly), $2.47{\pm}0.60$(healthy elderly) that were statistically significant. One year later, PADL and IADL of the elderly users were improved that statistically significant(p=0.01). The elderly users were wanted rehabilitation service(22.2%), talking service(20.6%), bath service(12.7%), food service(9.5%) of day care services in CHP's post. We are recommended that day care service for the elderly in CHP's post was very useful and contributed to promote ADL functions.

  • PDF

Utilization Rate of Medical Facility and Its Related Factors in Taegu (대구시민의 의료기관 이용률과 연관요인)

  • Kim, Seok-Beom;Kang, Pock-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.22 no.1 s.25
    • /
    • pp.29-44
    • /
    • 1989
  • A household survey was conducted to determine the utilization rate of medical facilities and to identify the factors related with the utilization in the South District of Taegu from July 3 to July 15, 1988. Study population included 1,723 family members of 431 households which were selected by one-stage simple cluster random sampling. Well trained medical college students interviewed mainly housewives with a structurized questionnaire. Morbidity rate of acute illness during the 2-week period was 101 per 1,000 persons and it was highest in the age group of 9 years below. The rate for chronic illness was 77 per 1,000 persons, increasing with age, low income and medicaid benefit. During the 2-week period, 689 of 1,000 persons utilized the medical facilities. Of the facilities, most number, 294, used hospital and clinic, and the order ran as pharmacy, health center, and herb medical clinic. The utilization rate was higher in the female, 70-year and older group, medicaid group, the lowest income class and self-employed group than other groups. The average number of visits among users of medical facilities during the 2-week period was 3.25. those who visited medical facilities most frequently were females, the 70-year and older group, the lowest income class and blue collar worker group. During one-year period, admission rate of 1,000 persons was 27.6 and that of female was 38.9, higher than that of male. the eldest group had the highest admission rate. Admission rate of medical insurance beneficiaries was twice or higher than non-beneficiaries. The higher the family monthly income, the more frequently they admitted. During one-year period, average admission days of the persons hospitalized were 22.5 days and males were hospitalized longer than females. The groups which were hospitalized longest were those between the ages of 40 and 49, medical insurance beneficiaries, the lowest income group and unemployed group. During one-year period, average admission days of 1,000 persons were 560 days and those of female were 661 days, more than those of male. The guoups which had the longest admission days were those above 70 years of age, the lowest income and unemployed groups. The medical insurance beneficiaries were three times or longer than non-beneficiaries. In logistic regression analysis of utilization of physician significant independent variables were the 9-year and younger group(+), the 70-year and older group(+), acute illness episode(+), chronic illness episode(+), medical insurance beneficiary(+) and white collar workers(-). Acute and chronic illness episode(+), and medical insurance for government employees and private school teacher(-) were significant variables in analysis of utilization of pharmacy. In multiple regression analysis of the number of physician visits, siginificant variables were acute illnes episode(+), chronic illness episode(+), industrial, occupational and regional medical insurance beneficiary(+), white collar workers(-). Acute and chronic illness episode(+), and medical insurance beneficiary(-) were significant variables in analysis of the number of pharmacy visits. In logistic regression analysis of admission event, significant independent variables were the 9-year and younger group(+), the 70-year and older group(+) , chronic illness episode(+), and medical insurance beneficiary(+).

  • PDF

Study on Preventing Copyrights Infringement through Blocking Advertisements of Illegal Copyrighted Websites (불법 저작물 사이트의 광고 차단을 통한 저작권 침해 방지 연구 - 자금 추적 기반 방식을 중심으로)

  • Shin, Myeong-Seob;Yong, Mi-Ran;Lee, Yeong-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.331-341
    • /
    • 2020
  • Recently the government has succeeded in shutting down the Illegal Copyrighted Websites by cracking down on the operators of the websites. But this only caused 'the Balloon Effect', similar websites were created and users shifted to the new websites. 'Follow the money' is drawing attention as a way to complement the effect of policies. It tracks the commercialization scheme and fund flows of the Illegal Copyrighted Websites and blocks the supply and publication of advertisements, which are the main source of revenue. This approach aims at self-closure of Illegal websites by blocking the revenue source. In this study, we have selected and analyzed overseas cases that adopted these measures. Many countries had different policies and campaigns, but three things are common: non-punishment measures, partnership based on voluntary participation, pursuing a variety of purposes other than protecting the copyright industry. In Korea, the reason public-private Partnerships was not properly established had been caused by the difference of views between them. Advertisers and agencies need to expand their awareness that illegal advertisements can have adverse effects such as brand image damage and enormous economic losses. Also campaigns and conferences related with the policy should be held to prevent copyright infringement through mutual understanding and cooperation.

국내 인터넷전문은행 설립시 예상되는 전자금융리스크에 대한 대응방안 연구

  • Kim, Tae-Ho;Park, Tae-Hyoung;Lim, Jong-In
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.33-48
    • /
    • 2008
  • 최근 은행의 소유지분한도와 설립자본금 등에 대한 정부의 금융규제 완화로 인터넷전문은행의 설립 가능성이 높아지고 있다. 그러나 우리나라의 전자금융환경은 전자금융거래법 제정에 따라 금융기관의 입증책임을 강화함으로써 금융기관의 전자금융리스크가 상대적으로 크게 증가하였다. 또한, 정보 공격기술 및 수법의 발달로 전자금융보안에 대한 위협이 지속적으로 증가하고 있다. 이외 에도 신BIS 리스크 평가에 IT운영리스크가 포함되는 등 금융환경 변화 및 정보통신 기술의 발전으로 인한 전자금융리스크가 계속 확대되고 있는 추세에 있다. 이러한 금융환경 변화와 함께 서비스채널이 인터넷에 집중되는 인터넷전문은행은 기존의 전통적인 은행과 차별되는 리스크에 추가적으로 노출될 위험성이 높다. 이러한 리스크에 대한 인식 및 대비 부재는 금융소비자가 금융권 전자금융거래에 대한 불신으로 확산되거나, 금융시장의 불안정성을 야기하는 금융사고로 이어져 자칫 국내 전자금융의 발전을 저해하는 심각한 요소가 될 수 있다. 본 논문에서는 국내 금융환경과는 차이가 있지만, 인터넷전문은행이 가져올 전자금융의 기술적 변화는 유사하다는 점에서 해외 주요국가의 인터넷전문은행 현황과 전자금융부문을 중심으로 인터넷전문은행 설립인가 사례를 살펴보고, 국내에서 인터넷전문은행 설립시 우리가 취해야 할 입장에 대해 시사점을 얻고자 하였다. 그리고 국내 전자금융 환경에서 전통적인 일반은행과 차별되거나 인터넷전문은행 고유의 특성으로 발생되는 주요 전자금융리스크를 다섯 가지로 분석하였고, 이러한 전자금융리스크를 줄이기 위한 대응방안을 모색해 보았다. 정부의 금융규제 완화는 금융자유화를 진전시켜 금융거래가 자유경쟁원리에 입각해 이루어짐에 따라 국민경제의 발전에 있어서 바람직한 결과를 얻고자 하는 것이다. 그러나 다른 한편으로 과도한 리스크에 노출 될 경우에는 금융시장의 불안정성을 야기하고 이로 인해 역 선택과 도덕적 해이를 야기 시키는 등 여러 가지의 폐해를 줄 수도 있다 이러한 폐해를 줄이기 위해서는 인터넷전문은행의 고유한 특성으로 수반되는 리스크와 상대적으로 그 중요성이 부각되는 전자금융리스크에 대한 관리 감독을 강화해야 한다. 또한 이러한 리스크 관리강화를 위한 제도적 장치는 인터넷전문은행의 자율성과 책임성을 부여하는 방향으로 이루어지는 것이 바람직하다. 인터넷전문은행이 실질적으로 다수의 금융이용자에게 다양한 혜택과 효율적인 금융서비스를 제공하기 위해서는 초기 사업계획 심사 단계에서부터 위험성이 크게 증가하는 전자금융리스크에 대해서, 적절한 관리방안 수립을 통해 예상되는 리스크를 줄이기 위한 노력이 필요하다고 생각한다. 그리고 인터넷전문은행에 대한 구체적인 인가요건이 마련되지 못한 현 상황에서, 국내 인터넷전문은행 설립이 우리나라 전자금융거래에 발전적 역할을 할 수 있도록 앞으로 더 많은 논의와 연구가 진행될 필요가 있다.

User Authentication Method using Vibration Cue on Smartphone (진동 큐를 이용한 스마트폰 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Ok-Kyung;Kim, Kang-Seok;Yeh, Hong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.167-172
    • /
    • 2012
  • Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.