• Title/Summary/Keyword: Data Copyright

Search Result 261, Processing Time 0.036 seconds

Challenges and Recent Movements in Scholarly Communication Concerning Electronic Journal Licensing Consortia (전자저널 컨소시엄을 둘러싼 학술커뮤니케이션의 쟁점과 대응동향)

  • Kim, Sung-Jin;Jung, Eun-Kyung;Han, Min-Hae
    • Journal of Information Management
    • /
    • v.39 no.1
    • /
    • pp.27-52
    • /
    • 2008
  • Electronic information, especially e-journals took their position as core resources in current scholarly communication. However, the publishing and pricing structure of e-journal licensing process have not yet succeeded to be reorganized in accord with newly changed electronic scholarly communication environment. That resulted in a lot of challenges scholarly communication now faced. This study aimed to analyze key issues regarding big deal, pricing, licensing, archiving, copyright and public access by conducting comprehensive literature review and examining movements of world wide scholarly institutes and alliances. And then this study eventually purposed to draw some strategies which domestic libraries and consortia should take in order to lead current changes in scholarly communication.

A Study of Digital Music Element for Music Plagiarism Analysis (음악 표절 분석을 위한 디지털 음악 요소에 대한 연구)

  • Shin, Mi-Hae;Jo, Jin-Wan;Lee, Hye-Seung;Kim, Young-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.43-52
    • /
    • 2013
  • The purpose of this paper is researching musical elements to analyze plagiarism between two sources. We first search digital music elements to analyze music source and examine how to use these in plagiarism analysis using compiler techniques. In addition we are used open source Java API JFugue to process complex MIDI music data simply. Therefore we designed music plagiarism analysis system by using MusicString which is supported in JFugue and construct AST after investigate MusicString's syntax processing elements to manipulate music plagiarism analysis efficiently. So far music plagiarism analysis is evaluated emotionally and subjectively. But this paper suggests first step to build plagiarism analysis systemically. If this research is well utilized, this is very meaningful to standardize systemically which music is plagiarized or not.

A Study on the Identification of Open Source License Compatibility Violations (오픈 소스 라이선스 양립성 위반 식별 기법 연구)

  • Lee, Dong-Gun;Seo, Yeong-Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.451-460
    • /
    • 2018
  • Open source software is used in various ways when developing new softwares all around the world. It requires rights and responsibilities as a form of an open source software license. Because the license is a contract between original software developers of the open source software and users, we must follow it and extremely cautious to avoid copyright infringement. In particular, we must verify license compatibility when we develop new software using the existing open source softwares. However, license violation issues always occur and lead to lawsuits so that they are having an adverse effect on the open source software ecosystem. Thus, in this paper, we propose a method, OSLC-Vid, to identify license violations whether compatibility issues exist between open source softwares. The proposed method is verified by the experiments to detect actual license violation cases.

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

Appraisal Method for Similarity of Large File Transfer Software (대용량 파일 전송 소프트웨어의 동일성 감정 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.11-16
    • /
    • 2021
  • The importance of software is increasing due to the development of information and communication, and software copyright disputes are also increasing. In this paper, the source of the submitted programs and the files necessary for the execution of the program were taken as the scope of analysis. The large-capacity file transfer solution program to be analyzed provides additional functions such as confidentiality, integrity, user authentication, and non-repudiation functions through digital signature and encryption of data.In this paper, we analyze the program A, program B, and the program C. In order to calculate the program similarity rate, the following contents are analyzed. Analyze the similarity of the package structure, package name, source file name in each package, variable name in source file, function name, function implementation source code, and product environment variable information. It also calculates the overall similarity rate of the program. In order to check the degree of agreement between the package structure and the package name, the similarity was determined by comparing the folder structure. It also analyzes the extent to which the package structure and package name match and the extent to which the source file (class) name within each package matches.

An exploratory analysis of factors influencing online music users' willingness to pay

  • Yu-Xuan, Yuan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.217-225
    • /
    • 2023
  • The willingness of online music users to pay is the key to the protection of music copyright and the sustainable development of the industry. This paper aims to study the influencing factors of online music users' willingness to pay based on exploratory analysis. Based on the theory of customer perceived value, the unified theory of technology acceptance and use, and the theory of fan enthusiasm, the research model is constructed. Validate the obtained 583 valid data. Through analysis, I got that perceived value, interpersonal influence, fan enthusiasm, and personal payment awareness directly affect online music users' willingness to pay; practical value and hedonic value have a positive impact on perceived value, and the impact of economic cost and compilation cost has not reached a significant level; Online word-of-mouth negatively moderates the impact of perceived value on users' willingness to pay for music. Music platforms can formulate operating policies based on this.

A Repository for Publications on Basic Occupational Health Services and Similar Health Care Innovations

  • Frank J. van Dijk;Suvarna Moti
    • Safety and Health at Work
    • /
    • v.14 no.1
    • /
    • pp.50-58
    • /
    • 2023
  • Background: Occupational health services are not available for more than 80% of the global workforce. This pertains especially to informal workers, workers in agriculture and in small enterprises, and self-employed. Many are working in hazardous conditions. The World Health Organization, the International Labor Organization, the International Commission on Occupational Health, and the World Organization of Family Doctors promote as part of a solution, basic occupational health services (BOHS) integrated in primary or community health care. Quality information on this topic is difficult to find. The objective of this study is to develop an open access bibliography, a repository, referring to publications on BOHS and similar innovations, to support progress and research. Methods: The database design and sustaining literature searches (PubMed, Google Scholar, SciELO) are described. For each publication selected, basic bibliographic data, a brief content description considering copyright restrictions, and a hyperlink are included. Results: Searches resulted in a database containing 189 references to publications on BOHS such as articles in scientific journals, reports, policy documents, and abstracts of lectures. A global perspective is applied in 43 publications, a national or regional perspective is applied in 146 publications. Operational and evaluative research material is still scarce. Examples of references to publications are shown. Conclusion: The repository can inspire pioneers by showing practices in different countries and can be used for reviews and in-depth analyses. Missing publications such as from China, Russia, Japan, Republic of Korea, and Spanish/Portuguese speaking countries, can be added in the future, and translated. Search functions can be developed. International collaboration for the promotion of occupational health coverage for all workers must be intensified.

A Study on the Intellectual property rights for the protection of financial instruments (금융상품의 보호를 위한 지식재산권 연구)

  • You, Hyun-Woo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.3
    • /
    • pp.1-9
    • /
    • 2017
  • Financial instruments are economic and intangible assets that bring financial company tremendous economic returns when it is a success. Also, It is necessary to protect this because it is a product of effort made by a lot of human resources and materials. However, legal and institutional devices for financial instruments are insufficient currently and 'copying practices' are rampant throughout the industry in korea. This ultimately inhibits the utility and welfare of consumers, but also adversely affects the competitiveness of the financial industry. In order to finance innovation that new financial products and services have appeared, it is necessary to grant the appropriate rights, such as intellectual property rights of financial instruments. And, there is a need for measures to protect it. Thus, this study proposed new way protecting the financial instruments through Intellectual property right. It is the introduction of similar protection system to financial instruments, such as mechanisms that protect database producers in copyright law.

Contactless Data Society and Reterritorialization of the Archive (비접촉 데이터 사회와 아카이브 재영토화)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.5-32
    • /
    • 2024
  • The Korean government ranked 3rd among 193 UN member countries in the UN's 2022 e-Government Development Index. Korea, which has consistently been evaluated as a top country, can clearly be said to be a leading country in the world of e-government. The lubricant of e-government is data. Data itself is neither information nor a record, but it is a source of information and records and a resource of knowledge. Since administrative actions through electronic systems have become widespread, the production and technology of data-based records have naturally expanded and evolved. Technology may seem value-neutral, but in fact, technology itself reflects a specific worldview. The digital order of new technologies, armed with hyper-connectivity and super-intelligence, not only has a profound influence on traditional power structures, but also has an a similar influence on existing information and knowledge transmission media. Moreover, new technologies and media, including data-based generative artificial intelligence, are by far the hot topic. It can be seen that the all-round growth and spread of digital technology has led to the augmentation of human capabilities and the outsourcing of thinking. This also involves a variety of problems, ranging from deep fakes and other fake images, auto profiling, AI lies hallucination that creates them as if they were real, and copyright infringement of machine learning data. Moreover, radical connectivity capabilities enable the instantaneous sharing of vast amounts of data and rely on the technological unconscious to generate actions without awareness. Another irony of the digital world and online network, which is based on immaterial distribution and logical existence, is that access and contact can only be made through physical tools. Digital information is a logical object, but digital resources cannot be read or utilized without some type of device to relay it. In that respect, machines in today's technological society have gone beyond the level of simple assistance, and there are points at which it is difficult to say that the entry of machines into human society is a natural change pattern due to advanced technological development. This is because perspectives on machines will change over time. Important is the social and cultural implications of changes in the way records are produced as a result of communication and actions through machines. Even in the archive field, what problems will a data-based archive society face due to technological changes toward a hyper-intelligence and hyper-connected society, and who will prove the continuous activity of records and data and what will be the main drivers of media change? It is time to research whether this will happen. This study began with the need to recognize that archives are not only records that are the result of actions, but also data as strategic assets. Through this, author considered how to expand traditional boundaries and achieves reterritorialization in a data-driven society.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.