• Title/Summary/Keyword: Right to preserve the integrity

Search Result 4, Processing Time 0.02 seconds

The Meaning of Parody and the Freedom of Expression (패러디의 의미와 표현의 자유)

  • Jang, Yeon-Yi;Kim, Hee-Kweon
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1333-1339
    • /
    • 2017
  • Parody is credited for one of the forms of artistic presentation, and the utilization has been increasing day by day. However, there is no clear regulation in legislation or case. Parody is usually made without authorization to exploit of original author, so there is a lot of controversy over its infringement of copyright. Constitutional Law guarantees the freedom of expression and that of art, but it protects the author's right as well. So it is important how settle the collision of fundamental rights. It is expected the development of a variety of discussion on parody from the views of the basic value the Constitution pursues and the improvement and development of the culture that is the purpose of Copyright Act.

Legal Problem on the Clipping of the Photographic Works in the Social Media (소셜미디어에서의 사진저작물 스크랩에 관한 법률문제)

  • Jang, Yeon-Yi;Kim, Hee-Kweon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.242-256
    • /
    • 2011
  • The activity to share personal daily life through social media is becoming more common. In this case, photographs as well as text are used a lot; it has been as easy as winking to clip others' photographs just as it's very easy to take and post pictures. If the picture is the photographic work protected by the copyright law, however, the clipping should be paid close attention. If you use others' photographic works without authorization, you infringe their copyright; if you post them on your social media such as blog, you infringe the right of reproduction, interactive transmission and exhibition. Even though the clipping is permitted, if you'd like to use the photographic works for a profit-making purpose, you should get additional authorization. Others' photographic works are occasionally altered and used for the purpose of avoiding the argument in relation to the infringement of copyright; this act means that it's the infringement of the right of reproduction, the right to preserve the integrity and the right of the production of derivative works for degrees of alteration. We can download others' photographic works with a few mouse clicks thanks to the technology of capturing the screen; we have to recognize that all the acts technically possible are not always legal.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

Semitendinosus Muscle Transfer Flap for the Treatment of Canine Fecal Incontinence

  • Cho, Hyoung-sun;Lee, Dong-bin;Kwon, Yong-hwan;Kim, Young-ung;Kang, Jin-su;Lee, Ki-chang;Kim, Nam-soo;Kim, Min-su
    • Journal of Veterinary Clinics
    • /
    • v.33 no.2
    • /
    • pp.131-134
    • /
    • 2016
  • A 4-year-old intact female Maltese was referred to the Animal Medical Center of Chonbuk National University with a history of consistent fecal incontinence over 4 months following sacculectomy surgery. We suspected that anal sacculectomy resulted in loss of the external anal sphincter. On physical examination, the external anal sphincter muscle on the left side was intact, while the external anal sphincter muscle on the right side could not be detected and exhibited severe laceration. To repair the defect, the left semitendinosus muscle was transposed around the anus. The left semitendinosus muscle was isolated and transected near the stifle, reflected dorsally and passed around the ventral rectum into the pararectal fossa. Care was taken to preserve the integrity of the vasculature and nerve supply. The muscle was secured dorsally with simple interrupted sutures to the levator ani and coccygeus muscles to simulate the external anal sphincter. Nine days after surgery, the dog was defecating normally with no evidence of incontinence. The use of semitendinosus muscle flaps is a good option for the treatment of fecal incontinence secondary to loss of sphincter muscle in dogs.