• Title/Summary/Keyword: Information Protection Law

Search Result 347, Processing Time 0.028 seconds

A Study on Improving Support for Victims of Cyber-Violence (사이버 폭력의 피해자 지원에 대한 개선방안)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.227-233
    • /
    • 2012
  • Recently, violence in cyberspace has been increasing and it causes not only severe emotional distress to the victims but also hampers a healthy cyber culture. This paper aims to find out about characteristics and the actual state of Cyber-Violence, and Evaluate the measures concerning it. Cyber crime is characterized as non face to face, anonymity, non-limitary, difficulties in attracting evidence, the Cyber Violence of these cyber crimes was shown in the form of cyber-insult, cyber-defamation, cyber-stalking, circulation of cyber-pornography, and that is the reality there are lack of practical measures. As a measure for protection the establishment of positive laws are needed on the cyber-contempt, adopting the Internet real-name system, strengthening the ISP's responsibility and legislation for criminal penalties. As a more fundamental measure, a greater effort of netizen's self-purification and systematic training and promotion for the prevention of damage is necessary.

A Study on the Activity Improvement Plan for Consumer ADR of Non-Government Consumer Organization (민간 소비자단체의 자율분쟁조정 활성화방안)

  • Kim, You-Jin;Kim, Si-Wuel
    • Journal of Families and Better Life
    • /
    • v.25 no.4
    • /
    • pp.197-216
    • /
    • 2007
  • The Purpose of this research is to perform survey on employees of Non-Government Consumer Organization and interview with ADR personnel from Korean Consumer Protection Board to have thorough grasp of problems among consumer ADR. Also come up with plan that will activate Non-Government Consumer organization ADR. Result of this research states following remarks as solution First, consumers from Seoul and Gyeonggi area is the only people who use ADR in Non-Government Consumer organization, so other local governments need to concentrate on consumers from rural area to take advantage of the service. Second, low activity of ADR and legal procedure support compare to other services provide from Non-Government Consumer organization. Third, statistic shows that employees from Non-Government Consumer organization recognize importance of consumer's ADR and government's support as well as enforcement of law. Forth, the preparation of Consumer ADR in Non-Government Consumer organization, selecting committee is the most important procedures are reinforce human resource, improvement of organization structure. Fifty, order to establish Consumer ADR in Non-Government Consumer organization, recruit professional manpower is the priority and financial support is also important. All these result would help improve the activity of ADR in Non-Government Consumer organization, which will lead the organization to be more professionalize, globalize and able to segment the market. Further more, Non-Government Consumer organization would develop better ways to take itself to another level to provide better service. Also, create an institution that will help consumer's dispute and legal procedure. It will prevent future victims and protect consumer's right.

Interpretation of Safeguard Agreement and Application to Korean domestic law under the WTO (WTO 세이프가드 협정의 해석과 국내법에의 적용방안)

  • Lee, Eun-Sup;Kim, Neung-Woo
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.271-298
    • /
    • 2011
  • This paper seeks the proper and efficient operation of Korea's safeguard mechanism by examining the judicial interpretation and application of the safeguard measures under the WTO Safeguard Agreement. The judicial examination is focused on the terms of "unforeseen development" in GAIT XIX, "evaluation of all relevant factors", and "clear justification of measure" in Safeguard Agreement. Such an intensive examination. of the judicial interpretation is used for the comparative analysis of the Korea's domestic provisions to find out problems in operation and the interpretative and legislative responses to them. It is found that the Korea's adaptation of the Safeguard Agreement into the domestic provisions and the operation of such provisions in the practical field have generally been consistent with the WTO's basic principles and provisions. Korea's safeguard mechanisms should stably be operated for securing the proper protection of domestic industry under certain emerging circumstances. For such policy objective to be ensured, it is legislatively required to make additional provisions in line with the appellate body's consistent interpretations of the debating issues including the term of unforeseen development.

  • PDF

The Relationship between Impulsive Buying Stimulus and Buying Experience in Cable TV Home Shopping (CATV 홈쇼핑에서의 충동구매 자극 요인과 구매 경험과의 관련성)

  • 서미정;김혜선
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.3
    • /
    • pp.105-118
    • /
    • 2004
  • Cable TV Home Shopping is one of the popular distribution channels in modem society because of purchasing convenience and saving in shopping time. However, in spite of these advantages, there are some problems because of marketing strategies of many Cable TV shopping companies which stimulate impulse purchases. This study is aimed to find the relationship between buying experience and reaction to impulsive buying stimulus. This study can give a valuable insight in consumer education regarding impulsive purchase behavior in Cable TV home shopping. Study results can also give useful information on the direction of consumer campaign and consumer protection policies. The data was collected by using a questionnaire and the final 496 cases were analyzed by SPSS Win 10.0 program. The major finding were that: 1. Younger, more educated and unmarried consumers tend to response more to impulsive purchasing stimulus. 2. consumers with higher response to impulsive purchasing stimulus had more buying experience, higher shopping frequencies and spent more money in Cable TV home shopping than consumers with lower response. These study results showed that there are some relationship between impulse purchasing stimulus and buying experience in Cable TV home shopping. Therefore, Cable TV Home Shopping companies should provide correct information to the consumers, so they can make resonable decisions. And the consumers should also try to restrain themselves from purchasing impulsively. A law that will regulate all false or exaggerated ads should be provided. To reach righteous and beneficial home shopping culture for both consumer and companies, all these means should be cooperated.

A Case Study: Unsupervised Approach for Tourist Profile Analysis by K-means Clustering in Turkey

  • Yildirim, Mustafa Eren;Kaya, Murat;FurkanInce, Ibrahim
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Data mining is the task of accessing useful information from a large capacity of data. It can also be referred to as searching for correlations that can provide clues about the future in large data warehouses by using computer algorithms. It has been used in the tourism field for marketing, analysis, and business improvement purposes. This study aims to analyze the tourist profile in Turkey through data mining methods. The reason relies behind the selection of Turkey is the fact that Turkey welcomes millions of tourist every year which can be a role model for other touristic countries. In this study, an anonymous and large-scale data set was used under the law on the protection of personal data. The dataset was taken from a leading tourism company that is still active in Turkey. By using the k-means clustering algorithm on this data, key parameters of profiles were obtained and people were clustered into groups according to their characteristics. According to the outcomes, distinguishing characteristics are gathered under three main titles. These are the age of the tourists, the frequency of their vacations and the period between the reservation and the vacation itself. The results obtained show that the frequency of tourist vacations, the time between bookings and vacations, and age are the most important and characteristic parameters for a tourist's profile. Finally, planning future investments, events and campaign packages can make tourism companies more competitive and improve quality of service. For both businesses and tourists, it is advantageous to prepare individual events and offers for the three major groups of tourists.

An Exploration on Personal Information Regulation Factors and Data Combination Factors Affecting Big Data Utilization (빅데이터 활용에 영향을 미치는 개인정보 규제요인과 데이터 결합요인의 탐색)

  • Kim, Sang-Gwang;Kim, Sun-Kyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.287-304
    • /
    • 2020
  • There have been a number of legal & policy studies on the affecting factors of big data utilization, but empirical research on the composition factors of personal information regulation or data combination, which acts as a constraint, has been hardly done due to the lack of relevant statistics. Therefore, this study empirically explores the priority of personal information regulation factors and data combination factors that influence big data utilization through Delphi Analysis. As a result of Delphi analysis, personal information regulation factors include in order of the introduction of pseudonymous information, evidence clarity of personal information de-identification, clarity of data combination regulation, clarity of personal information definition, ease of personal information consent, integration of personal information supervisory authority, consistency among personal information protection acts, adequacy punishment intensity in case of violation of law, and proper penalty level when comparing EU GDPR. Next, data combination factors were examined in order of de-identification of data combination, standardization of combined data, responsibility of data combination, type of data combination institute, data combination experience, and technical value of data combination. These findings provide implications for which policy tasks should be prioritized when designing personal information regulations and data combination policies to utilize big data.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

Propensity Analysis of Terrorism and Political Leaders Countermeasures (정치지도자 요인테러 성향 분석과 대응방안)

  • Kang, Kyoung Soo;Song, Sang Wook
    • Journal of the Society of Disaster Information
    • /
    • v.8 no.3
    • /
    • pp.287-296
    • /
    • 2012
  • This study is analysis of the existing domestic terrorism factors and suggest countermeasures for political leadership that can occur to the precautionary terror occasion of the presidential election approached 100 days in the future. Political terror caused mainly achieved peak of Ideology or social conflict by Politically alienated class. Common cause is most likely to occur when the party or the government want to attack a target or can not stand disadvantaged and lose that I suppert the party or the government. 21st century political terror is occurred with Misfits of complaints expressed or social conflict more frequency than attack used random people, new weqpon and bomb. It is interpreted that issued as a drastic measure from individual complaint because of increased polarization of wealth by separate into group and fallen law and order but also we are not familiar with the political compromises. Personal safety escort mission is essential condition of political activity that Absolute personal protection and to come up with a large number of voters for best result. Thus security guard ought to professional security activity depend on gathered situation, location and regional feature for perfect protection service.

A Study on the Service Status of Public Domain Works in Digital Library: Focusing on the Case of the National Library of Korea's Expired Works Service (디지털도서관의 퍼블릭도메인 저작물 서비스 현황에 관한 연구: 국립중앙도서관의 보호기간 만료 저작물 서비스 사례를 중심으로)

  • Hosin Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.3
    • /
    • pp.119-142
    • /
    • 2023
  • Copyright is a legal criterion for determining the scope and method of digital library service. Works with expired protection periods correspond to the public domain and can be freely used by anyone. For this reason, it is a priority consideration in digital library construction and services. The purpose of this study is to examine how actively libraries are using expired protected works for digital library services. To this end, the relevant provisions of the Copyright Act applied to the construction and service of digital libraries were first summarized, and the meaning of the copyright protection period was theoretically examined. The current status of online services for expired works by the National Library of Korea was examined, focusing on the works of three Japanese colonial era writers, Kim Yoo-jung, Lee Hyo-seok, and Chae Man-sik, to check the specific service status of expired works. It reveals that the National Library of Korea is not fully utilizing the scope of the law, and that this situation is linked to the rights of other authors included in the book. Based on these results, it suggests that there is a need to change the service unit to focus on copyrighted works and to use authority records to systematize the management of authors' death years.