• Title/Summary/Keyword: Internet Laws

Search Result 152, Processing Time 0.024 seconds

Implications of Digital Education Policy -Focused on Basic Act for Digital-based Education-

  • Shinhye, Heo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.321-329
    • /
    • 2024
  • This study attempted to obtain implications for digital education policy by reviewing the Framework Acts and Enforcement Decrees related to digital education. To this end, the following were explored. First, the concept and components of digital competency were reviewed. Second, the Framework Acts and Enforcement Decrees related to digital education policy were reviewed using the above concepts. Third, the characteristics and implications of the Framework Acts and Enforcement Decrees for digital education were explored. The results are as follows: Korea's digital education policy tried to reflect the categories that digital competency must cover, even its function and dysfunction role. However, to achieve their purpose, it is necessary to maintain consistency with related laws or policies. We identified that amendments to the Basic Act and related articles are essential to effectively enforce the Digital-Based Distance Education Activation Basic Act. A reevaluation of the correlation between Article 10, emphasizing digital media literacy education, and Article 5 of the enforcement decree is necessary. Revision of the enforcement decree to align with Article 10's objectives is vital to ensure proactive measures for promoting digital literacy and competence as mandated by the Basic Act.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

A Study on the Logistics Strategy for Expansion Export of Cross Border Trade to China (대(對)중국 국경간 전자상거래 수출 확대를 위한 물류전략에 대한 연구)

  • YU, Kwang-Hyun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.74
    • /
    • pp.81-103
    • /
    • 2017
  • The cross-border trade(CBT) market has grown significantly due to the global spread of the Internet and mobile. China has become a very important market because of its share of 78% in 2016 in the export of korea's CBT. To sum up this phenomenon, First, the forms of distribution and trade, in which the O2O method is utilized, are settled. Next, it is necessary to develop a new strategy to expand the stagnant export of Korea. In particular, it is time to look for an effective export expansion strategy to expand market share in the fast-growing Chinese market. For this purpose, this study proposed a strategy for efficient use of logistics as a countermeasure against China's CBT laws and regulations and development of CBT exports to China to develop effective export strategies.

  • PDF

A study on the protection of on-line digital contents industry -focused on on-line digital contents industry development act- (온라인디지털콘텐츠산업의 보호에 관한 연구 -온라인디지털콘텐츠산업발전법을 중십으로-)

  • Kang, Sung-Ju
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.55-67
    • /
    • 2004
  • The copyright law only protects the creative representation of works because it conditionally requires a creativity aspect of works. Due to the lack of protection regime in existing laws and the systems, the online digital contents industrial development act has been enacted to alternatively protect the digital contents providers based on a principle of preventive of illegal competition.

  • PDF

Contract Guideline for Digital Content Distribution (디지털콘텐츠 유통계약기준 개선 방안)

  • O, Sang-Hun;Park, Yeo-Won
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.53-67
    • /
    • 2004
  • On the base of IT growth, competition between countries for preoccupation of digital content market is keen. And it is prospected that the development of digital content industry will be more rapid with the base of telecommunication infra-structure(for example internet, digital broadcasting) which is the main channel for distribution of digital content. The bill of "Act for Development of Online Digital Content Industry", has passed the national assembly jan, 2002, and "Draft Blueprint for Developing Online Digital Content Industry(2003$\sim$2005)" was made on the base on that law feb, 2003. And we can find measures for protect the digital content manufacture in the laws such as "Literary Property Law", "Trademarks Law" and "law for prevention of unfair competition". On this study we suggested three measures to make digital content industry more profitable by the method of research of related law and industry survey.

  • PDF

International Conference of Consumer Protection Issues on B2C in APEC (APEC 국가의 전자상거래 소비자보호 현황과 개선방안)

  • Jun, Eui-Cheon;Kim, Jang-Ho;Kim, Seog-Min
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.27-46
    • /
    • 2002
  • Nowadays, the explosive evolvement of Internet. which is referred to as EC, has been prevailing. That has given the chance all of the world consumers to contact all of the world companies to enter into business relationship. But, electronic commerce laws have been established per conventional jurisdiction. some legal issues take place in the field of cross-border electronic commerce, including the governing law and competent courts. In this situations, it is gradually and widely required to lay down the internationally harmonized electronic commerce legal framework. Now, there are a lot of legal issues assumed in EC, in this study, we studied three precedence problems concerning B2C: Consumer Protection Law regarding B2C, Personal Information Protection Law in Private Sector regarding B2C, Web Site Trust Mark System.

  • PDF

Law and Regulatory Trends on Information Security of IoT (IoT 정보보호 법·규제 동향)

  • Kim, Pang-ryong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.781-782
    • /
    • 2015
  • As growth engines such as cloud, social networks, big data that can affect the security market have been grown, the information security industry has has also rapidly evolved. Reviewing information security policies carried out in USA, UK and Japan, this paper examines trends on the IoT-related information protection law and regulations that are at issue around the major developed countries. Through this research, we can get the implication that measures be taken as soon as possible to apply the existing data protection laws in the Internet of Things.

  • PDF

Evaluation of counseling Services in Private Consumer Counseling Sites (민간 소비자상담 사이트의 상담서비스 평가)

  • 김기옥;유현정;남수정
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.7
    • /
    • pp.145-163
    • /
    • 2001
  • The purpose of this study was to evaluate counseling services in consumer counseling sites. We analyzed the contents and services of consumer counseling from the following internet sites; http : //www . gcn. or. kr , http : //www. jubuclub. or. kr, http : //www. cacpk. erg, http : //www . tor. co. kr/~ consumer, http : //civ. miriman. co. kr, http ://my. netian .com/~rokmc9. The major findings were summarized as follows: (1) All sites provided both a lot of information on consumer affairs and services for consumer counseling. (2) Two out of six private consumer counseling sites were technically inappropriated. They are wow.gen.or.kr and cia.miriman.co.kr (3) Consumer counseling services with specialized information and laws on consumer affairs were more likely provided from sites of consumer organizations than personal sites. (4) Personal sites made more consumer friendly communication than organization sites.

  • PDF

A Distinction Technology for Harmful Web Documents by Rates (등급에 따른 웹 유해 문서 분류 기술)

  • Kim, Yong-Soo;Nam, Taek-Yong;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.859-864
    • /
    • 2006
  • The openness of the Web allows any user to access almost any type of information easily at any time and anywhere. However, with function of easy access for useful information, internet has dysfunctions of providing users with harmful contents indiscriminately. Some information, such as adult content, is not appropriate for all users, notably children. Additionally for adults, some contents included in abnormal porn sites can do ordinary people's mental health harm. In the meantime, since Internet is a worldwide open network it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse way, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies.

Detection of the Portent of Distributed DoS Attacks on the Internet AS-level Topology (인터넷 AS 레벨 토폴로지에서 분산서비스거부 공격 징후 탐지)

  • Kang, Koo-Hong;Lee, Hee-Man;Kim, Ik-Kyun;Oh, Jin-Tae;Jang, Jong-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.339-350
    • /
    • 2010
  • Despite lots of efforts to obtain an accurate picture of structure at the level of individual ASes, there is a few application works using the AS-level Internet topology. In this paper, we show that the power-law fits the number of down-stream customer ASes very well and also present the distributions of AS links with the "public view" from UCLA IRL laboratory. Moreover, we obtain the distributions of source-destination pairs of routing hops for two sites in Korea and the United States, and then we propose a new method to decide the randomness of Internet traffic using the obtained distributions and the BGP valley-free routing policy. The randomness of traffic must be a portent of outbreak of the distributed denial-of-service attacks.