• Title/Summary/Keyword: Made-Public Information

Search Result 791, Processing Time 0.028 seconds

Study on the Application of Information Commons in the Public Library: Focus on the Physical Space of Neutinamu Library (공공도서관의 IC 적용에 관한 연구: 느티나무도서관의 물리적 공간사례를 중심으로)

  • Nam, Tae-Woo;Ryu, Ban-Dee
    • Journal of Information Management
    • /
    • v.43 no.1
    • /
    • pp.23-39
    • /
    • 2012
  • This study is to suggest IC(Information Commons) as an alternative to solve the digital divide in the Information Age. The value of IC is based on the OA(Open Acess) and the essential elements of democracy. On the basis of previous studies, physical space was divided into six parts to realize the value of the IC. This study investigated and analyzed the use patterns and made several suggestions for applying IC in the Public Library.

A study on the detection of DDoS attack using the IP Spoofing (IP 스푸핑을 통한 DDoS 공격 탐지 방안에 대한 연구)

  • Seo, Jung-Woo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.147-153
    • /
    • 2015
  • Since the DoS(Denial of Service) attack is still an important vulnerable element in many web service sites, sites including public institution should try their best in constructing defensive systems. Recently, DDoS(Distributed Denial of Service) has been raised by prompting mass network traffic that uses NTP's monlist function or DoS attack has been made related to the DNS infrastructure which is impossible for direct defense. For instance, in June 2013, there has been an outbreak of an infringement accident where Computing and Information Agency was the target. There was a DNS application DoS attack which made the public institution's Information System impossible to run its normal services. Like this, since there is a high possibility in having an extensive damage due to the characteristics of DDoS in attacking unspecific information service and not being limited to a particular information system, efforts have to be made in order to minimize cyber threats. This thesis proposes a method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.

Applying the Space Syntax Technique to the Network of Public Transportation (Space Syntax 기법의 대중교통망 적용 방안에 관한 연구)

  • Jun, Chul-Min
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.12 no.2 s.29
    • /
    • pp.73-77
    • /
    • 2004
  • Due to the traffic congestion of the city and public transportation-oriented policies in large cities, public transportation is receiving attention and being used increasingly. However, relatively less research on the design and distribution of public transportation network and limitations in quantitative approaches have made implementation and operation practically difficult. Over- or under-supply of transportation routes caused unbalanced connectivity among areas and, thus, differences in time, expenses and metal burden of users traveling the same distances. On the other hand, the Space Syntax theory, originally designed to calculate the connectivity of urban or architectural spaces, helps generate quantitative connectivity of whole space simply based on the spacial structure. This study modified the original Space Syntax algorithm to fit the public transportation problem and showed how it is applied to a transportation network by creating an artificial GIS network.

  • PDF

Attribute Certificate Profile Research (속성인증서 프로화일 연구)

  • 윤이중;류재철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.5
    • /
    • pp.75-84
    • /
    • 2001
  • Existent public key certificates provide authentication information through some information on user\`s public key. However, an attribute certificate which stores and manage user\`s attribute information, provides various privilege information such as position, privilege and role. In recent, international organizations establishes standards on attribute certificate, and the researches and developments on attribute certificate have been widely made. In addition it may be expected to be used many real application area requiring for authorization information as well as authentication information. Therefore, this paper considers background and standardization trends of attribute certificate and describes the profile and related techniques of attribute certificate currently established by IETF. In addition, it introduces and access control system using attribute certificate and specifies applications of attribute certificate.

A Study on Enhancing Transfer Effect of Learning on Education for Local Public Service Personnel (공무원교육의 현업적용도 영향요인과 정책적 제고방안)

  • Kim, Jung-Won;Kim, Dongchul
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.43-59
    • /
    • 2013
  • The most important thing in training of organization is that how effectively it can be made most of the performance among the staff. It will be useless if the knowledge which gaining after training can not be applied. Therefore the transfer of learning is studied since it is important for decision of training. We studied the factors of transfer of learning and carried out a survey targeting the public officials of Gangwon province with the factors we made a study. We define the factor of both promoted and interrupted in training and suggest the way of improving it. The first, the modeling of competency can stimulate the desire of achievement and complete a course of training among staff of organizations. The second, the construction of training program and organizational culture just for Gangwon province can increase the satisfaction of training among the learners. The third, the establishment of management system after training can reinforce the capability making use of train. The sharing of each information with boss at the office can help to stimulate the function of feedback after training as well.

  • PDF

The History of Library Classification before Dewey in Western library (서양의 자료분류법의 발달과정 - 고대에서 해리스까지 -)

  • Kim Myung-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.185-213
    • /
    • 1993
  • This study is on the history of classification in Western library from ancient to Harris(1870), before Dewey. It looks into the classification systems of librarians, bibliographers, booksellers and libraries of that time. One of the earliest was the classification of the clay tablets in the Assyrian library of Assurbanipal. But the earliest recorded system in the papyrus is that which Callimachus(B.C. 310-240) devised for the library at Alexandria. In the medival, the monastry libraries used many classifications. but their libraries were very small. Gesner, Naude, Brunet, Jefferson, Edwards, Harris etc. tried to make a good classification for bibliographies and libraries. Especially Brunet made the scheme based on the French system, and it used on bibliographical classification and shelf classification in the many libraries. In 1859, Edwards made the classification scheme for the public library in the Great Britain. In 1870, Harris made the famous inverted Baconian classification and it strongly influenced the Dewey Decimal Classification.

  • PDF

Information Suppression and Projection Strategies Depending on Personality Traits: Using Social media for Impression Management (사용자의 성격에 따른 정보의 통제와 투사 전략: 인상관리를 위한 소셜미디어의 활용)

  • Yun, Haejung;Lee, Hanbyeol;Lee, Choong C.
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.147-162
    • /
    • 2017
  • As social media started to work as important communication tools, social media users have tried to manage their image, identity, and impression through social media. Social media service providers have been interested in providing various functions effectively disclosing users' emotion, such as posting, commenting, and sharing content; on the other hand, relatively few efforts have been made to provide social media functions for information suppression. In this study, therefore, we attempt to examine the relationship between Facebook users' personality and impression management behaviors. Personal traits of users including public self-consciousness, positive self-expression, and honest self-expression were considered as independent variables. Impression management behaviors are composed of two variables, which are suppression and projection. The survey was conducted, targeting 230 Facebook users. The research findings show that public self-consciousness and positive self-expression are positively associated with information suppression while both positive and honest self-expression is positively associated with information projection.

Business Environment of Public Sector Enterprises: Using the International Rankings for Evaluation

  • Shalimova, Nataliia;Kuzmenko, Halyna;Shalimov, Volodymyr;Reshetov, Valerii;Androshchuk, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.297-309
    • /
    • 2022
  • Taking into account the globalization of the economy and the intensification of European integration processes, it has been proved that an important part of evaluating the effectiveness of activity of public sector enterprises should be a comparative analysis of the overall operation environment, namely public procurement, economic environment and tax policy, with the relevant systems of other countries of the world. The indicators and components of international ratings "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been studied. Different groups of indicators forming "Doing Business" and "Paying Taxes" in the context of the impact on public sector enterprises have been identified: those which fully comply with the need to evaluate the operating environment of public sector enterprises and those which should be used with restrictions, regarding the peculiarities of creating and functioning of public sector enterprises. A comparative analysis of the place of Ukraine, Lithuania and Slovenia among other countries of the world in accordance with the international rankings of "Doing Business", "Paying Taxes", "Benchmarking Public Procurement" have been made. It has been substantiated that the results of such comparative analysis will allow identifying risk areas, and relevant information can be used in developing of recommendations for improving the effectiveness of activity of public sector enterprises.

Demand survey of spectrum information and a study on plan for disclosing spectrum information to the public (전파정보 수요조사와 개방 방안 연구)

  • Lim, Chang-Yong;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.253-259
    • /
    • 2017
  • As ICT industrial paradigm changes and wireless communication services evolve, demands on spectrum information are soaring. We conducted demand survey of experts and public in general on spectrum information and prioritized what we should disclose. And we looked into overseas cases and analyzed their policy, the current status, exceptions for opening spectrum information. In this paper, we suggested a direction on how to make spectrum information public in Korea. Also, we made a proposal to establish management system and legislation for opening spectrum information.

A Study on the Linkage Method of Address Information with Public Land Registries to Protect Tenants' Rights - Focusing on the Road Name Address Book - (세입자 보호를 위한 공적 장부의 주소정보 연계방안 연구 - 도로명주소대장을 중심으로 -)

  • Kim, Jeong-Hyeon;Kang, Seung-Mo;Lim, Mi-Hwa
    • Journal of Cadastre & Land InformatiX
    • /
    • v.53 no.1
    • /
    • pp.65-81
    • /
    • 2023
  • In recent times, there has been a surge in media coverage regarding fraudulent real estate lease scams. These scams have been attributed to speculators who made imprudent gap investments, in response to the sudden decline in real estate prices. The government has established new measures to safeguard tenants and prevent fraudulent real estate lease schemes in response to the growing incidence of tenants falling victim to such scams. Although there have been active research efforts on laws and regulations aimed at protecting tenants, such as the Tenant Protection Act and leasehold registration orders, there is an urgent need for research on the consistency of information across public ledgers, as real estate fraud has surged due to information asymmetry among these ledgers. This study aims to explore matching methodologies using matching keys for building information from real estate-related public ledgers, such as the building register and the road name address ledger, as well as to examine ways to integrate these ledgers with other public ledgers.