• Title/Summary/Keyword: Information disclosure

Search Result 640, Processing Time 0.023 seconds

Comparative Analysis on the Intellectual Property Right Policies of Standardization Organizations

  • Lee, Sang-mu;Park, Ki-shik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.7A
    • /
    • pp.1284-1289
    • /
    • 2001
  • The characteristics of the intellectual property right(IPR) conflict with standardization. This is because standardization aims to achieve the common use of technology while IPRs aim to protect the proprietary right on technology. The license to use IPR should be granted so that standards can be used without an infringement. IPR policies have common characteristics in most parts of their contents and also different application methodologies. The ultimate object of IPR policy is to receive license grant. In this paper, significant typical IPR policies of main standardization organizations are comparatively analyzed. The overall objective of the IPR policy is to make strategic environment for license grant. IPR disclosure becomes the best practice to acquire license grant. With this practice, the action to licensing refusal becomes one of the main strategic factors of IPR policies.

  • PDF

Analysing the Acceptability of Jeonju-Wanju Hydrogen Demonstration City (전주·완주 수소시범도시 주민수용성 분석)

  • Lee, Jihoon
    • New & Renewable Energy
    • /
    • v.17 no.4
    • /
    • pp.28-35
    • /
    • 2021
  • It is very important to secure hydrogen acceptability to achieve the hydrogen economy. This study empirically analyzed the factors affecting acceptance by using the results of a questionnaire administered to residents of Jeonju-Wanju Hydrogen Demonstration City. The results indicated that the safety of hydrogen infrastructure and local industry and economic growth positively affected acceptance. In particular, local industry and economic growth were more effective in improving resident acceptance. As policy factors, support for government policies and disclosure of information on projects were also positive factors. As perceptual factors, the higher interest in hydrogen and less safety concerns positively affected acceptability. Therefore, as far as hydrogen safety is concerned, it seems necessary to support local industry development to improve acceptability, disclose information related to industrial development, and introduce targeted experience programs.

A Trajectory Substitution Privacy Protection Scheme in location-based services

  • Song, Cheng;Zhang, Yadong;Gu, Xinan;Wang, Lei;Liu, Zhizhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4771-4787
    • /
    • 2019
  • Aimed at the disclosure risk of mobile terminal user's location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed. On the basis of the anonymized identities of users and candidates who request LBS, this scheme adopts trajectory similarity function to select the candidate whose trajectory is the most similar to user's at certain time intervals, then the selected candidate substitutes user to send LBS request, so as to protect user's privacy like identity, query and trajectory. Security analyses prove that this scheme is able to guarantee such security features as anonymity, non-forgeability, resistance to continuous query tracing attack and wiretapping attack. And the results of simulation experiment demonstrate that this scheme remarkably improve the optimal candidate' trajectory similarity and selection efficiency.

A comparison of synthetic data approaches using utility and disclosure risk measures (유용성과 노출 위험성 지표를 이용한 재현자료 기법 비교 연구)

  • Seongbin An;Trang Doan;Juhee Lee;Jiwoo Kim;Yong Jae Kim;Yunji Kim;Changwon Yoon;Sungkyu Jung;Dongha Kim;Sunghoon Kwon;Hang J Kim;Jeongyoun Ahn;Cheolwoo Park
    • The Korean Journal of Applied Statistics
    • /
    • v.36 no.2
    • /
    • pp.141-166
    • /
    • 2023
  • This paper investigates synthetic data generation methods and their evaluation measures. There have been increasing demands for releasing various types of data to the public for different purposes. At the same time, there are also unavoidable concerns about leaking critical or sensitive information. Many synthetic data generation methods have been proposed over the years in order to address these concerns and implemented in some countries, including Korea. The current study aims to introduce and compare three representative synthetic data generation approaches: Sequential regression, nonparametric Bayesian multiple imputations, and deep generative models. Several evaluation metrics that measure the utility and disclosure risk of synthetic data are also reviewed. We provide empirical comparisons of the three synthetic data generation approaches with respect to various evaluation measures. The findings of this work will help practitioners to have a better understanding of the advantages and disadvantages of those synthetic data methods.

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

Internet Financial Reporting: Case of Iran

  • Shiri, Mahmoud Mousavi;Salehi, Mahdi;Bigmoradi, Nahid
    • Journal of Distribution Science
    • /
    • v.11 no.3
    • /
    • pp.49-62
    • /
    • 2013
  • Purpose - The purpose of this paper is has been to identify the information disclosed by Internet website companies listed in Tehran Stock Exchange. Research design, data, methodology - The list was prepared includes 84 attributes for financial information in two parts and 36 non-financial information attributes and with 48 attributes of listed companies in Tehran Stock Exchange. Results - The results show that Internet reporting in Iran has improved compared to previous research. However, the level of financial disclosure and accounting firms with the most important research in this area is weak and these companies are more willing to disclose non-financial information to disclose their financial information. In Iran has been little research on Internet financial reporting. Conclusions - Although this study has been to the best possible information is available on the website of each company covered and fully evaluated but May have some unwanted data hidden from view has been fulfilled and is missing. The attribute relating to support of other languages, in this study, only the presence or absence of links (other languages) and information disclosed is limited to languages have not been studied other than Persian.

  • PDF

Study on the Contrast the two Koreas unified information and communication technology(ICT) standards for Policy Studies (통일대비 남북한 정보통신기술(ICT) 표준화 정책연구)

  • Choi, Sung
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.113-123
    • /
    • 2011
  • The purpose of this paper to lead North Korea to open up is the disclosure of the information. In addition, the world's standards must be tailored to the communication of information and communication world is possible. I closed the meantime, is a country that has a lot on its own standardized. First, the Republic of Korea and North Korea should be able to communicate in every way. So much information as possible should be accessible through the North and North-South cooperation as may be true. North Korea opening up to the leading international organization (UN) as part of this priority is public information and communication to induce North Korea must understand the standard. Therefore, in order to be a true national unity to be a leading priority with each other when integrated information and communications standardization is possible.

A Study of 4G Network for Security System

  • Kim, Suk-jin;Lee, Hyangran;Lee, Malrey
    • International Journal of Advanced Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.77-86
    • /
    • 2015
  • In this paper there is an overview of some standards and security models which are implemented in such an IP-based and heterogeneous networks and we also present some security models in an open environment and finally we obtain that as a result of the nature of 4G networks there are still more security holes and open issues for expert to notice. Our survey shows that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. Other than that, it tells about the security issues and vulnerabilities present in the above 4G standards are discussed. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention and future work by the research and advanced technology industry.

Effect of Intangible Assets on the Value Relevance of Accounting Information: Evidence from Emerging Markets

  • AL-ANI, Mawih Kareem;TAWFIK, Omar Ikbal
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.387-399
    • /
    • 2021
  • This study mainly aims to examine the effect of intangible assets on the value relevance of the Gulf Cooperation Council (GCC)-listed non-financial firms. This study tested three types of models by using a large sample of non-financial firms listed in GCC countries as emerging markets from 2008 to 2016. The types of models are accounting information (earnings per share and book value of share) without intangible assets model, intangible assets model, and accounting information (earnings per share and book value of share) with intangible assets model. Ordinary least square (OLS) shows mixed results as intangible assets improve the value relevance of accounting information positively in UAE and negatively in Kuwait but not in other countries. The study documents a robust positive relationship between intangible assets and earnings quality in terms of value relevance in KSA and Qatar. The findings provide implications for policymakers, investors, and managers. The results suggest that intangible assets can improve the value relevance in emerging markets, such as GCC, as the need to organize the requirements of information disclosures on intangible assets and provide great transparency and additional disclosure of information about intangible assets and their components.

Exploring the Strategy for Acquiring ISMS Certification through Probit Regression: Focusing on Organizational Characteristics (Probit 회귀분석을 통한 ISMS 인증 취득 전략 탐색: 조직 특성을 중심으로)

  • SunJoo Kim;Tae-Sung Kim
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.11-25
    • /
    • 2024
  • In the field of information security management systems, one of the representative certifications in Korea is ISMS-P certification, and internationally, ISO/IEC 27001 certification is recognized. When companies acquire both ISMS-P (or ISMS) and ISO/IEC 27001 certifications, budget and manpower are duplicated in similar areas. Therefore, it is necessary for the company to choose and invest in a certification that is suitable for its conditions. This paper proposes a strategy for obtaining information security management system certification that is suitable for the characteristics of the company, allowing for effective information security management based on the company's conditions. To achieve this, data were collected from the Ministry of Science and ICT's Information Security Disclosure System (ISDS), the Korea Internet & Security Agency (KISA), and the Financial Supervisory Service's Data Analysis, Retrieval and Transfer System (DART), and Probit regression analysis was conducted. During the Probit regression analysis, the relationships between seven independent variables and five cases of ISMS-P (or ISMS) acquisition, ISMS-P acquisition, ISMS acquisition, ISO/IEC 27001 acquisition, and both ISMS-P (or ISMS) and ISO/IEC 27001 acquisition were analyzed. The analysis results revealed the relationship between company characteristics, including industry, and certification acquisition in the ISMS field. Through this, strategies for certification acquisition based on company types could be suggested.