• Title/Summary/Keyword: Knowledge and Information Protection

Search Result 207, Processing Time 0.028 seconds

Grope for a Summary Program about Intellectual Property Protection of Traditional Knowledge (TK)etc. Discussed in WIPO (전통적 임상기술의 지적재산권 보호에 대한 고찰)

  • Choi Hwan-Soo;Kim Yong-Jin;Lee Je-Hyun
    • The Journal of Korean Medicine
    • /
    • v.25 no.3
    • /
    • pp.20-31
    • /
    • 2004
  • The 21/sup st/ century is a society based on knowledge, so in economic activities, it has emphasized the importance of information such as intellectual property or intangible asserts. Especially, according to the agreement on trade related as parts of intellectual property rights in WTO, it is used as the method of commercial entente and monopoly for intellectual property in an advanced nation. For this reason, WIPO and UNESCO discussed a complement for intellectual property on the foundation of traditional knowledge such as traditional knowledge (TK), genetic resources (GR) and traditional cultural expressions (TCE, folklore). Korea has a lot of knowledge falling under TK, GR, and TCE because of the long history of the country. In the case of traditional medical care, it has been used in the public health system. It is hard to apply these rights to traditional medical care of Korea because the laws of intellectual property have been established under the ideas of western culture. It is necessary to improve the classification system of traditional knowledge and patents. In the patent classified system of IPC, it needs to be related to the research between the classified system for massive technology and the classified system for traditional clinic technology.

  • PDF

Investigating the acceptance of the reopening Bataan nuclear power plant: Integrating protection motivation theory and extended theory of planned behavior

  • Ong, Ardvin Kester S.;Prasetyo, Yogi Tri;Salazar, Jose Ma Luis D.;Erfe, Justine Jacob C.;Abella, Arving A.;Young, Michael Nayat;Chuenyindee, Thanatorn;Nadlifatin, Reny;Redi, Anak Agung Ngurah Perwira
    • Nuclear Engineering and Technology
    • /
    • v.54 no.3
    • /
    • pp.1115-1125
    • /
    • 2022
  • Nuclear power plant (NPP) is currently considered as one of the most reliable power sources. However, 182 of them are considered decommissioned and inactive including the one in Bataan, Philippines. The aim of this study was to investigate the acceptance of the reopening of Bataan Nuclear Power Plant (BNPP) by integrating the Theory of Planned Behavior and Protection Motivation Theory. A total of 815 Filipinos answered an online questionnaire which consisted of 37 questions. The Structural Equation Modeling (SEM) indicated that knowledge towards nuclear power plants was the key factor in determining people's acceptance towards NPP reopening. In addition, knowing the benefits would lead to positive perceived behavioral control (PBC) and attitude towards intention. Results showed that PBC and attitude are mediators towards the acceptance of people regarding the reopening of BNPP. If an individual's knowledge gravitates towards the perceived risk, then this can lead to the negative acceptance of the NPP reopening. On the other hand, if an individual's knowledge gravitates towards the perceived benefits, then this will lead to positive acceptance. This study is the first study that explored the acceptance of the reopening BNPP. Finally, the study's model construct would also be very beneficial for researchers, government, and even private sectors worldwide.

The Effect of Perceived Information Control on the Knowledge Sharing Intention of the Social Network Service Users (인지된 정보 통제가 소셜 네트워크 이용자의 정보 제공 의도에 미치는 영향)

  • Lee, Un-Kon;Kim, Kyong Kyu;Song, Ho Hyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.107-127
    • /
    • 2013
  • The evolution of IT facilitated the communication and knowledge sharing between the social network service (SNS) users. When the more information about SNS users had been posted in SNS site, SNS users had sometimes exposed in the risk of privacy invasion. To remedy this problem, we had introduced the information control mechanisms from the prior studies in data management to the SNS area and empirically validated the effect of these mechanisms in this research. Three information control mechanisms had been elected as access control, reference control and diffusion control. We had conducted a survey to the Facebook users which is the most famous SNS site. 459 data had been gathered and analyzed by PLS algorism. As the results, reference control and diffusion control has significantly increased the trust on SNS providers and decrease the privacy concern. This change could significantly affect on the satisfaction with the SNS site and knowledge sharing intention of SNS users. This study could introduce the new perspective about privacy protection issues in SNS area. Also, the information control mechanisms suggested in this study could contribute to make more robust privacy protection mechanisms in SNS site in practice.

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Digital Watermark Verification with Zero Knowledge Proofs (디지털 워터마크에 대한 영지식 검증)

  • 이형우;김태윤
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.877-881
    • /
    • 2002
  • Digital contents such as image need both secure proving and publicly verification scheme on embedded digital watermark for contents distribution and copyright protection. Specially, we must provide publicly verification mechanism on digital watermark without revealing any of the secret information hidden on digital contents. In this paper, we review on the existing zero knowledge proofs and digital watermarking system, and propose advanced interactive zero knowledge proofs mechanism for enhancing the performance and security of watermark verification process. And it Provides a new watermark verification scheme without revealing any secret on the contents owner's copyright in formation.

  • PDF

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

Error Correction Codes for Biometric Cryptosystem: An Overview

  • Teoh, Andrew Beng Jin;Kim, Jaihie
    • Information and Communications Magazine
    • /
    • v.32 no.6
    • /
    • pp.39-49
    • /
    • 2015
  • In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

Analysis of Elements Related to Information Culture Literacy in Overseas Informatics Curriculums (해외 정보 교육과정에서 정보문화소양 관련 내용 요소 분석)

  • Yang, HyeJi;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.21 no.1
    • /
    • pp.1-10
    • /
    • 2018
  • Korea shifted the focus to competency-based curriculums in the revised national curriculum of 2015, and emphasized training creative convergence talents through informatics education. The informatics education curriculum included information culture literacy as a core competence so that the learners can gain knowledge of information technology-based information ethics and make ethical judgment and practice ethics. This study analyzed the elements related to information culture literacy in the informatics curriculums of the US, the UK, India, Japan, Australia and Germany for the purpose of providing implications with regard to the composition of elements that can foster information culture literacy. According to the analysis results, first, the term information culture literacy was included only in the informatics education curriculum of Korea. Second, the elements common to all countries are (personal) information protection, information security and copyright. Third, Korea's information society and career, India's avoidance of injuries, Germany's protection of health and environment were found only in the curriculums of respective countries. This study is significant in that it provided the orientation of improving the elements for fostering information culture literacy based on the results of analyzing overseas informatics curriculums.

Class Knowledge-oriented Automatic Land Use and Land Cover Change Detection

  • Jixian, Zhang;Yu, Zeng;Guijun, Yang
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.47-49
    • /
    • 2003
  • Automatic land use and land cover change (LUCC) detection via remotely sensed imagery has a wide application in the area of LUCC research, nature resource and environment monitoring and protection. Under the condition that one time (T1) data is existed land use and land cover maps, and another time (T2) data is remotely sensed imagery, how to detect change automatically is still an unresolved issue. This paper developed a land use and land cover class knowledge guided method for automatic change detection under this situation. Firstly, the land use and land cover map in T1 and remote sensing images in T2 were registered and superimposed precisely. Secondly, the remotely sensed knowledge database of all land use and land cover classes was constructed based on the unchanged parcels in T1 map. Thirdly, guided by T1 land use and land cover map, feature statistics for each parcel or pixel in RS images were extracted. Finally, land use and land cover changes were found and the change class was recognized through the automatic matching between the knowledge database of remote sensing information of land use & land cover classes and the extracted statistics in that parcel or pixel. Experimental results and some actual applications show the efficiency of this method.

  • PDF

Knowledge of the General Community in Cordoba, Argentina, on Human Papilloma Virus Infection and its Prevention

  • Venezuela, Raul Fernando;Monetti, Marina Soledad;Kiguen, Ana Ximena;Frutos, Maria Celia;Mosmann, Jessica Paola;Cuffini, Cecilia Gabriela
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.5
    • /
    • pp.2689-2694
    • /
    • 2016
  • Background: Most studies of human papilloma virus (HPV) are aimed at the natural history of the infection and its relation to cancer; however, there are few studies to assess knowledge of the general population. Our aim was analyze the degree of knowledge of Argentinians about HPV infection and its prevention. Materials and Methods: We conducted a voluntary, anonymous and non-binding survey with 27 multiple-choice items, in twelve private and public establishments, selected to include a broad population in terms of education, age and gender. The survey consisted of three sections: individual characteristics of the volunteer, HPV infection basic knowledge, its prevention and the virus relationship with other cancers. Results: One thousand two hundred ninety seven volunteers aged 18 to 80 participated. The total number of correct answers was 45.1%. The correct answers for relationship HPV and cervical cancer was 62.1%. Almost 55% did not know about types of HPV that the vaccines for protection. Statistical analysis showed that women, single people, workers, the better educated, those who have had a STDs or HPV and receiving information through medical or educational establishments had greater knowledge of the topic. Only 0.2% of participants answered all questions correctly. Conclusions: Knowledge plays an important role in health care and the deficiency found in our population could influence the success of the measures taken in the fight against cervical cancer. In this regard, we believe it would be appropriate, not only to emphasize early diagnosis and vaccine implementation, but also incorporate new communication strategies, facilitating reception of accurate and precise information by all strata of society.