• Title/Summary/Keyword: 인터넷서비스제공자

Search Result 25, Processing Time 0.022 seconds

A Study on the Internet Defamation Policy and Law - Focusing on the Communications Decency Act of 1996 and the Brodie Case (인터넷 명예훼손 방지를 위한 정책과 법안에 관한 연구 - 미국의 통신품위법과 Brodie 사건을 중심으로)

  • Bae, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.29-37
    • /
    • 2012
  • Defamation is one of the most frequently occurring daily legal violation because it can easily be done by words. In the internet generation with flooding internet forum websites and social network services, internet defamation is becoming one of the most serious problems in many leading IT countries including Korea and the United States. Being such a critical issue that can lead to a suicide, Korean policy makers has undertaken efforts to prevent the internet defamation by defining the liabilities of internet users and internet service providers. Many of the policies and laws including "the Telecommunication Information Usage Promotion and Security Protection Act of 2007" are modeled after that of the United States. Thus, the study aims to explore American defamation law and internet defamation law analyzing "the Communications Decency Act of 1996" and a recently decided precedent, "Brodie" case, in Maryland state court.

A Study on The Improved Selection Method of Information Security Management System(ISMS) Certification Object Applying SMART Technic (SMART 평가법을 활용한 정보보호 관리체계(ISMS) 인증 의무대상자 선정 기준 개선 방안에 관한 연구)

  • Jang, Sang Soo
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.85-94
    • /
    • 2014
  • Information Security Check System was Introduced in 2004, higher than in 2013, the effectiveness of Information Security Management System(ISMS) certification scheme was to unification. This is incident to the Internet affecting people's lives telecommunications service provider to target accountability because, considering the subject's duty selection criteria need to be clarified. however, Obligations under the current legislation, subject selection criteria applying the law itself is ambiguous, the result being a significant problem. Moreover, the regulatory system of certification systems subjects, although selection criteria should be clear and objectively not the obligation not to distrust the system itself and the subject was raised many issues for you. In this study, with SMART Technic in order to improve this certification you can easily determine whether a medical person authorized to develop a model for selection of medical subjects, The developed model is verified through empirical ways to improve the system by presenting the system to help, to secure the effectiveness.

Deploying Method for Home Network with IPv6 based on Next Generation Internet (차세대 인터넷에서 IPv6를 적용한 홈네트워크 구성 방안)

  • 윤희준;이정준;정운영;정선화;박석천
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.802-805
    • /
    • 2002
  • 홈네트워킹 인프라는 다양한 응용분야 및 생활환경을 배경으로 한다는 특수성으로 인해 서비스의 일반화가 기존의 기간망이나 기업 통신망보다 어렵다는 특성이 있다. 따라서 다양한 사용자의 요구사항을 만족하기 위해서는 홈네트워크는 일반 사용자들이 쉽게 그 정보가전기기들을 사용할 수 있어야 한다. 이를 위해서는 먼저 설정과 유지보수가 간단한 홈네트워크를 갖는 것이 필요하다. 다음으로 홈네트워크 내의 정보가전기기들간의 통신, 홈네트워크 외부의 서비스제공자와의 통신, 그리고 외부로부터의 원격제어 또한 가능하여야하며 상호간의 신뢰성있는 연결을 위한 보안도 필요하다. 따라서 본 논문에서는 위에서 언급한 과제들을 해결하기 위해서 자동 설정, 보안, 이동성 지원, 단순 경로 배정, 그리고 디바이스와 서비스의 발견 등과 같은 IPv6 기능들을 홈네트워크에 적용하는 방안을 고찰하였다.

  • PDF

불법 복제 콘텐츠 필터링 기술 동향 분석

  • Kim, Ju-Seop;Nam, Je-Ho
    • Broadcasting and Media Magazine
    • /
    • v.12 no.4
    • /
    • pp.53-63
    • /
    • 2007
  • 인터넷과 멀티미디어 기술의 발달은 우리에게 다양한 콘텐츠를 손쉽게 접할 수 있는 환경을 제공하였다. 그러나 멀티미디어 콘텐츠의 무분별한 복제와 불법유통으로 인한 저작권 침해는 심각한 사회적 문제로 대두되고 있다. 이에 정부는 저작권법을 전면 개정하면서 강력한 대응책을 마련하고 있다. 특히 개정 저작권법은 동영상, 음악, 게임 등 다양한 콘텐츠에 대한 불법 유통을 방지하고자 특수한 유형의 온라인서비스제공자들의 기술적 조치(필터링)를 의무화하고 있다. 이에 따라 필터링기술에 대한 관심이 높아지면서 해당 온라인서비스사업자(OSP)들은 필터링 기술의 적용을 준비하고 있으며, 기술개발업체들은 법적 기준을 충족시킬 수 있는 필터링 기술의 개발을 위해 노력하고 있다. 본 고에서는 이러한 상황의 배경과 필터링 기술의 개요와 국내외 동향 및 향후 전망을 제시한다.

A Study on the Scope of Protection for Freedom of Expression on Internet: Focused on the Analysis of Judicial Precedents on Cyber Conflicts (인터넷에서 표현의 자유 보호 법리에 관한 연구: 사이버 분쟁에 대한 법원 판례 분석을 중심으로)

  • Yun, Sung-Oak
    • Korean journal of communication and information
    • /
    • v.50
    • /
    • pp.29-49
    • /
    • 2010
  • Various opinions are expressed about the Internet Regulation. Some people argue that it is impossible to control because of the technical characteristics of Internet, while other people argue that it is easy to control. Recently in Korea, a move to reinforce the Internet Regulation through the extension of cyber real-name system is emerging, whereas the concern for its excessive infringement of the Freedom of Expression is increasing. This paper was intended to draw a reasonable direction for Internet Regulation in our society. And accordingly this paper tried to suggest a desirable direction of Internet Control in the future and to draw a criterion for domestic court judgement by analyzing cases of cyber defamation so far. The result of this study proposed that the Freedom for Expression be widely secured in the case of cyber defamation of criticism and political comments upon public officials and that the legitimacy and effectiveness of Internet Regulation be ensured. This result of study is expected to help establish the direction and principle of Internet Regulation in the future around Korea Communications Commission and Korea Communications Standards Commission.

  • PDF

Privacy-Preserving Outlier Detection in Healthcare Services (IoT환경에서 프라이버시를 보장하는 의료데이터 이상치 탐색 기법)

  • Lee, Bo Young;Choi, Wonsuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1187-1199
    • /
    • 2015
  • Recently, as high-quality sensors are being developed, it is available to conveniently measure any kind of data. Healthcare services are being combined with Internet of things (IoTs). And applications that use user's data which are remotely measured, such as heart rate, blood oxygen level, temperature are emerging. The typical example is applications that find ideal spouse by using a user's genetic information, or indicate the presence or absence of a disease. Such information is closely related to the user's privacy, so biometric information must be protected. That is, service provider must provide the service while preserving user's privacy. In this paper, we propose a scheme which enables privacy-preserving outlier detection in Healthcare Service.

A Study on Secure and Statistical Data Aggregation in Ad Hoc Networks (애드혹 네트워크에서 안전한 통계정보수집 기법에 관한 연구)

  • Cho, Kwantae;Lee, Byung-Gil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.561-563
    • /
    • 2014
  • 애드혹 네트워크(Ad Hoc Network)는 최근 이슈가 되고 있는 사물 간 인터넷(Internet of Things), 스마트그리드(Smart Grid), 사람 중심 도시 센싱(People-Centric Urban Sensing), 해상 통신(Maritime Communications) 환경에서 다양하게 활용되는 네트워크 구조다. 이러한 환경에서의 애플리케이션들은 사용자들에게 다양한 편의성을 제공하기 위하여 사용자의 민감한 프라이버시 정보를 요구하기도 한다. 하지만, 만약 수집되어지는 프라이버시 정보가 인가되지 않은 공격자에게 노출된다면, 사용자는 불안함을 호소할 수 있을 것이고, 동시에 해당 데이터를 수집하고자 했던 서비스제공자는 경제적으로 커다란 손실을 입을 수 있다. 이러한 프라이버시 정보 노출을 방지하기 위하여 안전한 데이터 수집 기법들이 연구되어 왔다. 하지만, 대부분의 기법들은 기밀성만 제공할 뿐, 부인방지 및 익명성은 제공하지 않는다. 그리고 더 나아가 기존 기법들은 통계정보 수집과 개별적인 정보 수집을 동시에 제공하지 않는다. 본 논문은 개별정보수집 및 통계정보 수집을 모두 지원하며 동시에, 사용자에게 강화된 익명성 개념인 비연결성을 제공하는 새로운 데이터 수집 기법을 소개한다.

A Design and Implementation of Service Provider Initiated Multicast Middleware for Reliable Multimedia Data Communication (멀티미디어 데이터 통신의 신뢰성 보장을 위한 서비스 제공자 중심의 멀티캐스트 미들웨어 설계 및 구현)

  • Kim, Moon-Hwa;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.11-18
    • /
    • 2002
  • The IP multicasting service system based on IGMP(Internet Group Management Protocol) is the receiver initiated multicasting system that all receivers must join to and leave from the server of multicasting service. The IGMP is less effective and reliable to apply the education system that all computers of students ore synchronized a teacher's computer. A proposed middle-ware in this paper provides the reliable data transferring and the server initiated multicasting system that client as student's PC is controled by a multicasting server as teacher's PC, This middle-ware is consisted with two major component, The one is the group manager that handle the status informations of members in each group. Another is the reliable sender/receiver that has The transmission protocol based on NAK message and flow control. As the results of the test that 22khz digital voice data and 1024$\times$768 24bit color image data were tested for 30 PCs connected with 100baseT, the voice data was completely without error transferred and the image data was successfully transferred with 0.004% retransmit rate under 2 frames/sec load.

  • PDF

A Study on the Factors affecting the Recovery Satisfaction at Logistics Service Failure (물류서비스실패시 회복만족에 영향을 미치는 요인에 관한 연구)

  • Choi, Youngro
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.4
    • /
    • pp.169-191
    • /
    • 2012
  • This study is to investigate the strategy on forming a long term relationship between logistics service provider and demander including maintaining strategy of it. For these purposes, effect on the organization and human factor of Logistics service companies and also, impact on the customer trust and relational commitment against service recovery are analysed. Literature review and empirical study are used to modify research model and to develop questionnaire for logistics service companies. Reliability for measuring procedure yields the same result on repeated trials and validity for identifying the accuracy of the accrual measuring instrument are also used. Suggested hypothesis are verified through multiple regression method and the testing results are shown as follows; First, organization and human factor have a positive effect to the service recovery satisfaction against the service failure of logistics service providing company. Second, the service recovery satisfaction also leads a positive effect on the customer trust and relational commitment.

A proposal of assurance model based on i-PIN assurance level (아이핀 보증 등급에 기반한 보증 모델)

  • Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.287-299
    • /
    • 2016
  • The electronic transactions over the Internet are growing across the world recently. There have been a lot of identity theft incidents during these online transactions nowaday. Therefore, a high level of identity proofing shall be carried out when using online services to deal with these matter. To prevent this kind of incident, i-PIN was introduced in Korea, which is used as an Internet Personal Identification Number. The i-PIN is designated to provide an online identification of the Internet users. As such, the unique identification numbers are provided to the internet service providers. This paper is to analyze the capabilities that the i-PIN provides, to propose the assurance security model for i-PIN. Furthermore, the security analysis results are presented. The result of this paper can be applicable to improve the applicabilities of the i-PIN.