• Title/Summary/Keyword: Disclosure limitation

Search Result 24, Processing Time 0.021 seconds

A Study on the Disclosure and Exemption of the Personal Data (개인정보의 공개와 보호에 관한 연구 - 영국 사례를 중심으로 -)

  • Kim, Jung Ae
    • The Korean Journal of Archival Studies
    • /
    • no.29
    • /
    • pp.225-268
    • /
    • 2011
  • The general public are interested in the politics and form public opinion and keep in check the government for true democracy. The general public have the right to be furnished information from the government. And the government should enact the Freedom of Information Act to provide the public's right to know. At the same time, the government should enact the Data Protection Act to provide the public's right to privacy. There is a friction between the Freedom of Information Act and the Data Protection Act. It's hard to maintain the proper balance between the Freedom of information Act and the Data Protection Act, but many countries try to do so. The UK enacted the Data Protection Act 1998(DPA), which entered into force on 2000, to comply with EU Directive 1995. The Freedom of Information Act 2000(FOI), which came fully into force on 2005, was passed in 2000. The FOI imposes significant duties and responsibilities on public authorities to give access to the information they hold. The purpose of this study is to consider the provisions of the personal data in FOI and DPA. Besides this, it identifies the complaint cases on public authorities about the disclosure and exemption of the personal data in comparison with the acts. If information is the personal data of the person making the request, it will disclose under the DPA. If information is the personal data of a third party, it will disclose under the FOI. These acts interact each other to make up for the weak points in the other to make a proper application of the act on public authorities. This study may have any limitation in making a comparative study of the disclosure and exemption of the personal data in Korea. But it is expected to provide a basis for understanding the disclosure and exemption of the personal data in the UK.

An efficient Broadcast Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크에서의 효율적 Broadcast Authentication 방안)

  • Moon Hyung-Seok;Lee Sung-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.23-29
    • /
    • 2006
  • It is difficult to apply conventional security algorithms to the wireless sensor networks composed of nodes that have resource constraints such as memory, computing, power resources limitation. Generally, shared key based algorithms with low resource consumption and short key length are used for broadcast packets in authentication of base station. But it is not suitable that all the nodes hold the same shared key only for packet authentication. Recently, broadcast authentication algorithm for sensor network is proposed, which uses key chain generation by one-way hash function, Message Authentication Code generation by each keys of the key chains and delayed key disclosure. It provides suitable authentication method for wireless sensor networks but may leads to inefficient consequence with respect to network conditions such as broadcast ratio, key chain level, and so on. In this paper, we propose an improved broadcast authentication algorithm that uses key chain link and periodical key disclosure. We evaluated the performance of proposed algorithm using TOSSIM(TinyOS Simulator) in TinyOS. The results show that the proposed algorithm ensures low authentication delay, uses memory and computing resource of receiving nodes efficiently and reduces the amount of packet transmitting/receiving.

The case study on interview mise-en-scène of documentary film (다큐멘터리 <노무현입니다> - 인터뷰 미쟝센 사례 연구)

  • Lee, Changjae;Sim, Jihyun
    • Trans-
    • /
    • v.7
    • /
    • pp.81-101
    • /
    • 2019
  • Interviews are so important and meaningful that it is the heart of the documentary. In narrative film, it is focused as the story discourse, whereas documentary is strong in disclosure, which consists of narration and interview. In a TV documentary, interviews use conventional shots repeatedly, whereas in a documentary film that targets a relatively large screen, the interviewer's Mise-en-scene should consider the aesthetic depth. , which released in 2017 and used the audience for the third time in documentary film history, tries to make 40% of the volume of the main volume equal to the same angle. In a TV documentary, it is not uncommon for an interview cut to exceed 30 seconds, and if it exceeds 1 minute, immersion is significantly lowered, so the a mount and compression of the interview disclosure is important for both the director and the audience. In the case of the interview sequence of , it was the key to communicate the sub-plot with a relatively focused with long discourse, which is at least 8 minutes and 30 seconds to a maximum of 11 minutes, in a way that allows the audience to communicate. Furthermore, it was produced after the death of the protagonist Roh Moo Hyun, with the limitation that the voice of the protagonist was excluded, and the voice of Roh Moo Hyun was indirectly reproduced through the surrounding characters. In this study, it covers the meaning and scope of interviews in the production of documentary, and the aesthetic applications of the Mise-en-scene.

  • PDF

Study on the Relationship among the Size, Marketing Competency, Operational Characteristics and Financial Performance of Food Service Franchising (외식 프랜차이징의 규모, 마케팅 역량, 운영특성과 재무성과 간의 관계연구)

  • Kang, Seok-Woo;Na, Young-Sun
    • Culinary science and hospitality research
    • /
    • v.20 no.6
    • /
    • pp.175-189
    • /
    • 2014
  • This study was intended to provide fundamental data concerning franchising companies' characteristics and performance in foodservice business by employing financial data from the firms' IDS(Information Disclosure Statements). Multiple regression analysis method was used to identify any correlations among franchising size, marketing competency, operational characteristics, and performance according to technique based upon 169 IDS data as of 2013. In terms of franchisor size and performance, the number of company-operated stores had statistically significant corelation with sales, net income, the total number of stores, and the number of franchisees. With respect to marketing competency and performance, advertising expenses showed statistically significant correlation with sales, the total number of stores, promotion expenses with sales, net income, and the total number of stores. On the other hand, there was no statistically significant correlation with current year's net income. At last, present study found significant correlations among business years, sales, current year's net income, and the total number of stores by regarding operational characteristics and performance, but there was no significant correlation between brands and performance. This study is cross-sectional study which is a limitation to be overcome in further studies. In addition, it is required to review the possibility for franchise management style to contribute to expanding the Korean traditional foods.

A BERT-Based Deep Learning Approach for Vulnerability Detection (BERT를 이용한 딥러닝 기반 소스코드 취약점 탐지 방법 연구)

  • Jin, Wenhui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1139-1150
    • /
    • 2022
  • With the rapid development of SW Industry, softwares are everywhere in our daily life. The number of vulnerabilities are also increasing with a large amount of newly developed code. Vulnerabilities can be exploited by hackers, resulting the disclosure of privacy and threats to the safety of property and life. In particular, since the large numbers of increasing code, manually analyzed by expert is not enough anymore. Machine learning has shown high performance in object identification or classification task. Vulnerability detection is also suitable for machine learning, as a reuslt, many studies tried to use RNN-based model to detect vulnerability. However, the RNN model is also has limitation that as the code is longer, the earlier can not be learned well. In this paper, we proposed a novel method which applied BERT to detect vulnerability. The accuracy was 97.5%, which increased by 1.5%, and the efficiency also increased by 69% than Vuldeepecker.

The Effects of the Change of Operating Income Disclosure Policy under K-IFRS - Evidence from KOSDAQ Market - (K-IFRS 이후 영업이익 공시정책의 변화에 대한 연구 - 코스닥 시장을 중심으로 -)

  • Baek, Jeong-Han;Choi, Jong-Seo
    • Management & Information Systems Review
    • /
    • v.33 no.3
    • /
    • pp.167-187
    • /
    • 2014
  • While Korean GAAP had detailed regulations for the measurement and disclosure of operating income in the past, K-IFRS did not provide specific rules for operating income until 2011. Some firms that adopted K-IFRS before 2011 did not disclose or calculated operating income in an inconsistent manner although operating income is usually considered as one of the core information items to assess firm valuation. Inconsistency in firms' treatment of operating income invoked much criticism from diverse users of financial statement. The Korean Accounting Institute (KAI hereafter) revised the K-IFRS rules relevant to operating income in September 2010 in response to the voices raised by the business community, whereby the operating income number is allowed to be calculated in conformity with the previous K-GAAP. This study was motivated by the revision of K-IFRS and aims to provide a clue on the validity of such policy decision. To achieve the research objective, we test the relative value relevance of the alternative operating income numbers under K-IFRS versus K-GAAP. Our main findings are as follows. The value relevance of operating income reported before K-IFRS is proved to be higher than after K-IFRS. K-IFRS operating income adjusted to the previous K-GAAP has greater explanatory power for market values relative to one calculated under the K-IFRS regime. In an additional analysis, the sample was decomposed according to whether the operating income under K-IFRS is greater than under K-GAAP. The difference in the value relevance of K-IFRS versus K-GAAP operating income is significant only in the subsample consisting of firms which reports higher operating income under K-IFRS compared to K-GAAP. Also, the firms which would have reported negative operating income on a consecutive basis are more likely to have chosen K-IFRS, resulting in higher numbers than otherwise. It is likely that firms facing the threat of delisting due to consecutive operating loss reporting are more likely to have adopted K-IFRS disclosure rules by which they could report higher operating income numbers. To sum up, these results corroborate the limitation inherent in the K-IFRS regarding operating income disclosures. This paper suggests that the recent revision of K-IFRS implemented by KAI is likely to mitigate some of afore-mentioned limitations effectively.

  • PDF

A Criminal Legal Study in the Protecting the Right of Surgical Patients - Self-Determination of Patients - (수술환자의 권리보호에 대한 형사법적 쟁점 - 환자의 자기결정권을 중심으로 -)

  • Yoo, Jae Geun
    • The Korean Society of Law and Medicine
    • /
    • v.16 no.2
    • /
    • pp.3-26
    • /
    • 2015
  • Recently, Practicing of ghost surgery and duty of informed consent of doctors have become a big issue in the medical dispute and lawsuits. The ground of admitting the informed consent and the agreement(self-determination of patients) can be based on the dignity of man and the right to pursue his happiness guaranteed under Article 10 of the constitution in theory. However there are no explicit legal regulations on the duty of the informed consent and there is no substantive legal enactment on the informed consent, but there is a collision between self-determination of patients and the discretionary power of doctors. If the discretionary power on the duty of the informed consent was extended it may result in the infringement of the right of surgical patients, so called arbitrary medical treatment. Relating to this issue, New Jersey Supreme Court held that a patient has the right to determine not only whether surgery is to be performed on him, but also who shall perform it. Moreover it held that a surgeon who operates without the patient's consent engages in the unauthorized touching of another and, thus, commits a battery'. But there are no ghost surgery cases adopting battery theory in Korea, and professional negligence has been considered rather than the battery, regarding an absence of hostile intent to injure patient. Supreme Court of Korea held that a doctor who operates a medical procedure without the patient's valid prior consent based on wrong diagnosis commits professional negligence resulting in injury, and the patient's invalid consent do not preclude wrongfulness'. However, if a health care provider conducts a completely non-consensual treatment or substitute surgeon without consent, the action should be plead in battery, not negligence, but if a health care provider violate his duty of care in obtaining the consent of the patient by failing to disclosure all relevant information (risks) that a reasonable person would deem significant in making a decision to have the procedure, the action should be plead in negligence, not battery. Therefore, the scope of patients' self-determination can be protected by stating clearly the scope of the duty of the informed consent and the exemption of the informed consent legislatively, it is considered that it is valid to legislate the limitation of the discretionary power.

  • PDF

A Study on cooperation of Record Center following relocation of Central Administrative Agencies focusing on collective management of space and function in Record Center (세종시 이전 중앙행정기관의 기록관 운영 방안 검토 공간 및 업무의 공동 운영을 중심으로)

  • Nam, Kyeong-ho;Kwon, Yong-Chan
    • The Korean Journal of Archival Studies
    • /
    • no.34
    • /
    • pp.29-56
    • /
    • 2012
  • Since 2011, 148 public institutions (including the central administrative agencies) have been moving to the provinces. First of all, the Prime Minister's Office began to be relocated to Sejong City on 14 Sep, 2012, followed by 6 central administrative agencies and their cooperative agencies are planned to move there. With regard to public institutions' relocation, the issue of record centers' relocation should be also considered. In respect that there is lack of facilities, manpower, and equipment in most record centers, it is doubtable whether the relocation of record centers will end successfully. The purpose of this study is to investigate the current state of record centers and to grasp their issues when they are relocated. The targets are the central administrative agencies which will move in 2012. The data was collected by request of information disclosure and personal contact with record centers. After analyzing collected data, both the issues caused by relocation and the cases of environment improvement were assured. In addition, the improvement of record centers' limitation (ex. The lack of exclusively responsible workers, the shortage of facilities, space and budget etc.) was suggested.

A Study on the Charge of Using the Internet Network - Focusing on U.S. Internet History and Charter Merger Approval Conditions Litigation - (인터넷 망 이용의 유상성에 대한 고찰 - 미국 인터넷 역사 및 Charter 합병승인조건 소송 중심으로 -)

  • Cho, Dae-Keun
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.123-134
    • /
    • 2021
  • This paper suggests that the Internet is not free through analysis of U.S. Internet history and lawsuits related to the Charter merger in 2016. Generally speaking, the players in internet connectivity market agree to Non-Disclosure Agreement, when connecting their facilities and networks each other. So, I adopted the case study & analysis as research methodologies due to limitation of collecting the transaction data between them. The former finds that Internet access has never been free in U.S Internet history. As we know, some including Content Providers(CPs) argue that the Internet is a free network and there are many cases to use the internet for free, so they came to conclusion that ISPs have no right to charge the users like CPs. This study refutes these arguments in two ways. One is that using the internet has never been free. From ARPANET, known as the beginning of the U.S. Internet, to the commercialization of backbone, no Internet has been considered or implemented for free since the early Internet network was devised. Also, the U.S government was paying subsidies or institutions were paying fees to secure network operations for the NSFNET backbone. the other is that "free peering" refers to barter transactions between ISPs, not to free access to counterpart internet networks. Second, this study analyze the FCC' executive order of conditioned merger approval and the court's related ruling and verify that using the internet is not free. According to the analysis, this study finds that it's real situation to make paid settlements between ISP-CPs (including OTTs) in the US Internet market at the moment. This study concludes that the Internet has never been free in terms of its technical characteristics, network structure, network operation, and system. Also it proposes how to improve the domestic settlement system between ISPs-CPs in terms of policy and regulation.

A Study on Librarians' Perception about the Current Status and Establishment of Academic Library Development Plan (대학도서관 발전계획 현황과 수립에 관한 사서의 인식 조사)

  • Yong-Jae Lee;Sun-Gu Jeon;Jin-Gyeong Jeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.331-350
    • /
    • 2023
  • The purpose of this study is to investigate the academic librarians' perception of the current status and establishment of the development plans of domestic university libraries to suggest ways to increase usefulness of development plans. And this study sought ways to establish the academic library development plan that reflected the key components of the development plan. To this end, a survey was conducted on academic library librarians, and in-depth interviews were conducted with the persons in charge of the academic library development plan to supplement the limitations of survey. The results are as follows. First, the establishment of academic library development plans tend to be formal and passive, and has limitation in eliciting cooperation between external organizations and academic libraries. Second, most academic libraries do not disclose their development plans on their websites. Third, the awareness of the leaders of the academic library organization needs to be preceded, and a task force needs to be formed to establish development plan. As a result of the study, it is suggested that 'active changes in the perceptions and operation method within academic libraries', 'external disclosure of development plans and strengthening cooperation', and 'strengthening the initiative and role of librarians' are needed as improvement measures.