• Title/Summary/Keyword: Policy user

Search Result 1,556, Processing Time 0.023 seconds

A Study on Need Analysis for User-Customized Policy Information Services (이용자맞춤형정책정보서비스 수요분석 연구)

  • Kwak, Seung-Jin;Noh, Younghee;Kim, Dong-Seok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.2
    • /
    • pp.75-109
    • /
    • 2015
  • This study proposed to develop a model for user-customizable policy information services, based on an assessment of policy users' demands and a case analysis of customized services. To do this, we analyzed literature related to user customized services, performed case studies, and carried out a survey targeting policy information consumers. In this way, this study suggested that information retrieval and data offerings, reference information services, policy information network services, library marketing services, and personalized service are details which user-customizable policy information services must provide.

Privacy Controller using XACML for Internet Identity Management System (인터넷 Identity 관리 시스템 환경에서 XACML을 이용한 프라이버시 컨트롤러)

  • Roh, Jong-Hyuk;Jin, Seung-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.438-447
    • /
    • 2007
  • In the Internet, an identity service must to obtain permission from a user to allow them to share data with requesting service. For that, the privacy policy, which reflects legal regulations and preferences made by the user, is needed. Also, the management interface that aids the user to make the privacy policy and the PDP system that makes admission control and policy decisions in response to a request from an entity wanting to access the personal information are needed. In this paper, the privacy controller system model handled under the internet Identity management system environment is proposed. The system has the easy interface of policy generation and the efficient policy decision process. The system applies and modifies to the XACML of OASIS group. We propose that the privacy policy is divided into the three policies, which are the user policy, the domain policy and the basic offering policy. To resolve the collision between the policies, we also propose the collision resolution policy.

Two stage maintenance policy under non-renewing warranty (비재생보증 하에서의 이단계 보전정책)

  • Jung, Ki Mun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.6
    • /
    • pp.1557-1564
    • /
    • 2016
  • Recently, an extended warranty of a system following the expiration of the basic warranty is becoming increasingly popular to the user. In this respect, we suggest a two stage maintenance policy under the non-renewing warranty from the user's point of view in this paper. In the first stage, the user has to decide whether or not to purchase the extended warranty period. And, in the second stage, the optimal replacement period following the expiration of the warranty is determined. Under the extended warranty, the failed system is minimally repaired by the manufacturer at no cost to the user. We utilize the expected cost from the user's perspective to determine the optimal two stage maintenance policy. Finally, a few numerical examples are given for illustrative purpose.

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

The User Fee Introduction and Its Effect in the Health System of Low and Middle Income Countries: An Exploratory Study Using Realist Review Method (중·저소득 국가의 건강보장제도에서 이용자 부담 도입과 효과: Realist Review 방법을 활용한 탐색적 연구)

  • Son, Kyung Bok;Kim, Chang-Yup
    • Health Policy and Management
    • /
    • v.25 no.3
    • /
    • pp.207-220
    • /
    • 2015
  • Background: The purpose of this exploratory study is to explain where, when and how the introduction of user fee system works in low and middle income countries using context, mechanism, and outcome configuration. Methods: Considering advanced research in realist review approach, we made a review process including those following 4 steps. They are identifying the review question, initial theory and mechanism, searching and selecting primary studies, and extracting, analyzing, and synthesizing relevant data. Results: User fee had a detrimental effect on medical utilization in low and middle income countries. Also previous and current interventions and community participation were critical context in user fee system. Those contexts were associated with intervention initiation and recognition and coping strategies. Such contexts and mechanisms were critical explanatory factors in medical utilization. Conclusion: User fee is a series of interventions that are fragile and dynamic. So the introduction of user fee system needs a comprehensive understanding of previous and new intervention, policy infrastructure, and other factors that can influence on medical utilization.

The Effect of Perceive Service Quality of Local Content Production Policy on User Satisfaction, Reuse Intention, and Recommendation Intention (지역콘텐츠 제작지원 사업의 지각된 서비스 품질이 이용 만족, 재이용 의도, 추천 의도에 미치는 영향)

  • Kim, Sehwan
    • 지역과문화
    • /
    • v.8 no.2
    • /
    • pp.1-20
    • /
    • 2021
  • This study analyzed the effect of perceived service quality for the local content production policy on the service user satisfaction, reuse intention, and the recommendation intention. First, reliability, responsiveness, and adequacy were identified as the service quality evaluation criteria of the local content production policy. Second, all of the quality evaluation criteria had a positive effect on the service user satisfaction. Third, responsiveness had a positive effect on reuse intention, and responsiveness and reliability had a positive effect on recommendation intention. Fourth, the service user satisfaction had a positive effect on the reuse intention and recommendation intention. Therefore, this study has the significance of presenting a theoretical model for the service quality evaluation of the local content production policy, and suggesting perspective for the improvement of the policy.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.

A Study on the Establishment of Price Policy for a Geographical Information Activated Circulation (지리정보유통 활성화를 위한 가격정책수립에 관한 연구)

  • Shin, Dong-Bin;Hong, Sang-Ki;Ahn, Jong-Wook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.11 no.4 s.27
    • /
    • pp.29-34
    • /
    • 2003
  • The purpose of this study is to present the price computation criteria with the aspect of price policy for the geographical information circulation. The price policy is to make activated circulation for geographical information. The price policy of this research considered the supplier and the user side at the same time. Important issue of price policy is that initial cost for system development calculate burying cost, and preservation and renewal cost charge to user. Distribution cost of geographical information charge to user according to use media, and apply differential rates of cost according to the purpose of using, up-to-dateness of data. Also, present the price policy that must apply copyright fee to of offer geographical information. Consider various terms that was studied in this study, the price computation criteria was presented. Through this, it is expected that geographical information circulation is activated more.

  • PDF

A Cooperative Proxy Caching for Continuous Media Services in Mobile Environments (이동환경에서 연속미디어 서비스를 위한 협력적인 프록시 캐슁)

  • Lee Seung-Won;Lee Hwa-Sei;Park Seong-Ho;Chung Ki-Dong
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.691-700
    • /
    • 2004
  • This paper proposes a user's mobility based cooperative proxy caching policy for effective resource management of continuous media objects in mobile environments. This policy is different from the existing proxy caching policies in terms of how to exploit users' mobility. In other words, existing caching policies work based on the information about objects by referring to user's requests within a specified domain whereas the proposed caching policy runs by utilizing a number of user's requests across several domains. So, the proposed policy is applicable to random requests in mobile environments Moreover, we also propose a replacement policy based on weights and playback time. To check the efficiency of the proposed caching policy, the proposed replacement policy is run with different size of caching unit object or segment. The result of performance analyze tells what a ratio of user's mobility is are major factors for the efficient operation of the cooperative caching.