• Title/Summary/Keyword: Information Network Law

Search Result 302, Processing Time 0.03 seconds

Analysis of Anti-SPAM Regulations in Korean IT Law (정보통신망법 스팸 규제 개선 방안 연구)

  • Kim, Seongjun;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2011
  • Spam refers to any unwanted or unauthorized commercial messages. Spam may violate individuals' privacy or other personal rights. Spam often overloads network traffic, wastes individuals' time, lowers productivity and quality of life, and limits the trustworthiness of Internet businesses. As the use of mobile messaging services and social networking services both on mobile communication networks and on the Internet increase, newer and more complex types of IT applications and services are often used as new means of spam. In this research, the characteristics and impact of new and future forms of spam, and anti-spam related policies and regulations are surveyed. To improve the effectiveness of anti-spam policies and regulations in Korea, adding a definition of spam in the law, changing policies to focus on the 'type of services' rather on the medium of transmission, and redefining the scope of 'commercial purposes' in Korean law are suggested.

A Genetic Algorithm for the Chinese Postman Problem on the Mixed Networks (유전자 알고리즘을 이용한 혼합 네트워크에서의 Chinese Postman Problem 해법)

  • Jun Byung Hyun;Kang Myung Ju;Han Chi Geun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.1 s.33
    • /
    • pp.181-188
    • /
    • 2005
  • Chinese Postman Problem (CPP) is a problem that finds a shortest tour traversing all edges or arcs at least once in a given network. The Chinese Postman Problem on Mixed networks (MCPP) is a Practical generalization of the classical CPP and it has many real-world applications. The MCPP has been shown to be NP-complete. In this paper, we transform a mixed network into a symmetric network using virtual arcs that are shortest paths by Floyd's algorithm. With the transformed network, we propose a Genetic Algorithm (GA) that converges to a near optimal solution quickly by a multi-directional search technique. We study the chromosome structure used in the GA and it consists of a path string and an encoding string. An encoding method, a decoding method, and some genetic operators that are needed when the MCPP is solved using the Proposed GA are studied. . In addition, two scaling methods are used in proposed GA. We compare the performance of the GA with an existing Modified MDXED2 algorithm (Pearn et al. , 1995) In the simulation results, the proposed method is better than the existing methods in case the network has many edges, the Power Law scaling method is better than the Logarithmic scaling method.

  • PDF

A Study on "the other person" in Act on promotion of information and communications network utilization and information (정보통신망 이용촉진 및 정보보호 등에 관한 법률상의 "타인"에 관한 고찰)

  • Kim, Hye-Rim;Park, Kwang-Hyun;Park, Jong-Ryoel
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.173-175
    • /
    • 2013
  • 본 논문에서는 정보통신망 이용촉진 및 정보보호 등의 관한 법률에서 '타인'의 범위에 관한 해석을 논점으로 삼고 있다. 대법원은 위 법 제49조의 '타인'의 범위에 관한 해석에서 생존한 사람뿐만 아니라 사망한 자도 포함하여 해석하고 있다. 물론 동법의 사자(死者)도 정보통신망의 안정성과 정보의 신뢰성 확보를 위해 포섭하여 해석할 수 있다는 견해가 존재할 수 있지만 형법 및 형사특별법은 죄형법정주의라는 이념상 허용될 수 없다는 견해가 타당하다. 형사법의 해석은 형벌이라는 가혹한 법률효과를 예정하고 있으므로 형벌법규의 해석은 엄격해야 하고 명문규정의 의미를 피고인에게 불리한 방향으로 확장해석하거나 유추해석을 해서는 안된다. 만약 동법 제49조의 '타인'의 범위에 사자(死者)를 포함한다면 법률해석의 방법인 문리해석, 논리해석, 목적론적 해석, 헌법 합치적 해석에도 반하므로 동법에서 '타인'의 범위에 사자(死者)를 포함시키고자 한다면 동법의 개정을 통해 법규 수범자에게 예측가능성을 확보할 수 있도록 용어의 분명한 정의규정이 입법을 통해 반영되어야 한다.

  • PDF

A Study on the Problems and Improvements in the Related Law in order to Introduction of the Electronic Letter of Credit in Korea (한국의 전자신용장 도입을 위한 관련 법률상의 문제점과 개선방안에 관한 연구)

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.11 no.2
    • /
    • pp.233-257
    • /
    • 2009
  • The 21st century is witnessing the explosive increase in the usage of internet and international electronic transactions. Due to the unique characteristics of the electronic information, substantial part of such transaction can and do take the form of cross-border transactions. However, there have not been settled appropriate set of rules applicable to the international electronic transactions. Currently, in respect to e-L/C transactions in international trade, there are laws such as Electronic Transaction Basic Act in our country, E-Trade Promotion Act, E-Signature Law, Act on Promotion of Information and Communication Network Utilization and Information Protection and Marine Charter 5 in the Commercial Law. Nevertheless, a complete legislation, that is a uniform rule for e L/C which could support e L/C transactions fully hasn't been established yet. Accordingly, those laws concerned need to improve to regulate e-L/C transactions. The purpose of this paper is to look into the national status for law readjustment to prepare for a new electronic environment and to use appropriately the e-L/C issued by electronic means, and to conduct a comparative analysis on the related regulations to introduce a pertinent laws and propose related regulations to contribute to the making of effective laws to regulate e-L/C.

  • PDF

Foreign Key Management Server Products and the necessity of Korean Related Law and Policy (해외의 키관리서버 제품들과 우리나라의 해당 법규정 및 정책 설정의 필요성)

  • Kim, Ji Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.501-504
    • /
    • 2012
  • Personal Information Protection Law and Information Communication Network Law is administered from March, 2012 and August, 2012. It is very important to protect and manage the key well so that the third party doesn't know the key. Thus, at present, there increases an importance of Key Management Server. Key Management Server is an appliance type of hardware equipment which can securely store and manage encryption and decryption key. In this paper, we will survey on foreign key management server products and discuss about the necessities of legislation of related law and establishment of policy.

  • PDF

Problems of Regulatory and Legal Support of Polygraph Application in Ukraine

  • Irkha, Yurii;Butenko, Oleksii;Pogrebytskyi, Mykola;Manzhai, Oleksandr;Krushynskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.203-206
    • /
    • 2021
  • The article is devoted to the study of the problems of polygraphic research to obtain forensically significant information. An analysis of the legal basis for the use of the polygraph in Ukraine. Problematic issues concerning the appropriateness of using a polygraph in the investigation and detection of crimes have been studied. The domestic legal norms that regulate this issue, as well as foreign experience are analyzed. The article reveals the essence of the polygraph, the legal basis and requirements for its use. Attention is drawn to the main difficulties of using a polygraph and ways to solve them.

Evaluation of Similarity Analysis of Newspaper Article Using Natural Language Processing

  • Ayako Ohshiro;Takeo Okazaki;Takashi Kano;Shinichiro Ueda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.1-7
    • /
    • 2024
  • Comparing text features involves evaluating the "similarity" between texts. It is crucial to use appropriate similarity measures when comparing similarities. This study utilized various techniques to assess the similarities between newspaper articles, including deep learning and a previously proposed method: a combination of Pointwise Mutual Information (PMI) and Word Pair Matching (WPM), denoted as PMI+WPM. For performance comparison, law data from medical research in Japan were utilized as validation data in evaluating the PMI+WPM method. The distribution of similarities in text data varies depending on the evaluation technique and genre, as revealed by the comparative analysis. For newspaper data, non-deep learning methods demonstrated better similarity evaluation accuracy than deep learning methods. Additionally, evaluating similarities in law data is more challenging than in newspaper articles. Despite deep learning being the prevalent method for evaluating textual similarities, this study demonstrates that non-deep learning methods can be effective regarding Japanese-based texts.

Technology of Decision-Making Support Regarding the Possibility of Donation and Transplantation Considering Civil Law

  • Hnatchuk, Yelyzaveta;Hovorushchenko, Tetiana;Drapak, Georgii;Kysil, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.307-315
    • /
    • 2022
  • The review of known decision-making support systems and technologies regarding the possibility of donation and transplantation showed that currently there are no systems and technologies of decision-making support regarding the possibility of donation and transplantation considering civil law. The paper models the decision-making support process regarding the possibility of donation and transplantation, which is a theoretical basis for the development of rules, methods and technology of decision-making support regarding the possibility of donation and transplantation considering civil law. The paper also developed the technology of decision-making support regarding the possibility of donation and transplantation considering civil law as a component of the Unified State Information System for Organ and Tissue Transplantation, which automatically and free of charge determines the possibility/impossibility of donation and transplantation. In the case of the possibility of donation, the admissible type of donation is also determined - over-life or after-life donation - and data about potential donor is entered in the relevant Donor Register. In the case of the possibility of transplantation, if the recipient needs a transplant of one of the paired organs or a part of the organ/tissue, then data about potential recipient are entered in the Transplantation List from both over-life and after-life donor, otherwise, if the recipient needs a transplant of a non-paired organ or both paired organs, then data about potential recipient are entered only in the Transplantation List from after-life donor.

Utilities Market: The Sphere of Protection of Subjects

  • Dzhumageldiyeva, Gulnara;Zablodska, Inna;Yukhymenko-Nazaruk, Irina;Dovgaliuk, Vita;Suprunova, Irina;Gylka, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.266-274
    • /
    • 2021
  • The study covers three components of the facility for protecting public utilities market participants in the public utilities market: prevention of potential poverty, reduction of existing poverty and compensation to the injured party in a case of tort that exacerbates or threatens to exacerbate its poverty. The analysis is based on official statistical information on the activities of the public utilities sector. Operational information of public utility service providers regarding certain indicators of their activity in the work was not studied. This approach narrows the empirical basis of the study, but at the present stage in the context of different rates of implementation of changes in regions, sectors and at the level of individual entities, as well as lack of uniformity in the structure of indicators published by service providers, analysis allows to identify «bottlenecks» of legal regulation, which are systemic in nature and largely independent of the subjective factor.

Framework for End-to-End Optimal Traffic Control Law Based on Overlay Mesh

  • Liu, Chunyu;Xu, Ke
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.428-437
    • /
    • 2007
  • Along with the development of network, more and more functions and services are required by users, while traditional network fails to support all of them. Although overlay is a good solution to some demands, using them in an efficient, scalable way is still a problem. This paper puts forward a framework on how to construct an efficient, scalable overlay mesh in real network. Main differences between other overlays and ours are that our overlay mesh processes some nice features including class-of-service(CoS) and traffic engineering(TE). It embeds the end-to-end optimal traffic control law which can distribute traffic in an optimal way. Then, an example is given for better understanding the framework. Particularly, besides good scalability, and failure recovery, it possesses other characteristics such as routing simplicity, self-organization, etc. In such an overlay mesh, an applicable source routing scheme called hierarchical source routing is used to transmit data packet based on UDP protocol. Finally, a guideline derived from a number of simulations is proposed on how to set various parameters in this overlay mesh, which makes the overlay more efficient.