• Title/Summary/Keyword: Rights Issue

Search Result 225, Processing Time 0.02 seconds

Measuring the Effectiveness of Teaching and Actual Condition of Internet Ethics of the Undergraduate Students (인터넷 윤리의식의 실태 분석 및 교육 효과 측정)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1257-1269
    • /
    • 2010
  • The internet which is fast spread over all areas of our lives provides us with benefits of efficiency, productivity, and amusement; however, its features as an anonymous and non-face-to-face medium have raised a serious social issue of the collapse of internet ethics due to the abuse of it. Thereupon, the importance of internet ethics education has been highlighted to prevent side effects resulted from the internet and cultivate human-centered internet culture. In this paper, we suggests desirable methods for internet ethics education based on the investigation and analysis of the status of university freshmen's internet ethics. This research conducted a survey and analyzed its result after categorizing the status of internet ethics into the invasion of private information, invasion of intellectual property rights, harmful information, internet communication culture, cyber violence, internet addiction, and internet fraud. And based on the result of analyzing their internet ethics, this paper suggests desirable methods for internet ethics education. Next, internet ethics education was conducted by applying the proposed methods for internet ethics education, and its educational effect was evaluated. According to the result of verifying the educational effect measured statistically, it has proved that the suggested internet ethics education is effective to improve undergraduates' internet ethics.

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

The Sequential Effects of WebCam Wireless Moritoring Service on Customer Loyalty (웹캠 무선원격 모니터링 서비스가 고객충성도에 미치는 영향에 관한 연구)

  • Ryu, In-Soo;Chae, Myung-Sin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.51-79
    • /
    • 2009
  • Today the service industry is growing, and differentiated services for marketing and service quality is emerging as a serious problem. Until now, the WebCam is used for observation, and the negative aspects, such as from a human rights issue has become. Discipline and Punish is not to use a webcam to customer satisfaction research is needed. Therefore, wireless monitoring in WebCam service quality of the service reconfiguration and service quality factors for the configuration of the customer's preference regarding how research was recognized. Configuration of the service quality factors WebCam service customer satisfaction and customer loyalty was to identify factors that affect. These services to study the correlation between the quality variables WebCam provides wireless monitoring services for the preschool and children, a survey of the house. Configuring a wireless monitoring service quality in order to research the factors WebCam video quality and transmission speed, mobility and portability, convenience, visibility, reliability, and the interaction of the castle set. Severely and video quality and transmission speed, visibility, reliability, customer satisfaction, the interaction factors are said. Inclination to participate in social issues, innovation, digital devices that use a skilled, depending on the difference in the service quality has been confirmed. However, the age and quality of service awareness and job types showed a low correlation, and the marketing of these results will be discussed and how that can be used.

  • PDF

A Trend Analysis and Policy proposal for the Work Permit System through Text Mining: Focusing on Text Mining and Social Network analysis (텍스트마이닝을 통한 고용허가제 트렌드 분석과 정책 제안 : 텍스트마이닝과 소셜네트워크 분석을 중심으로)

  • Ha, Jae-Been;Lee, Do-Eun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.17-27
    • /
    • 2021
  • The aim of this research was to identify the issue of the work permit system and consciousness of the people on the system, and to suggest some ideas on the government policies on it. To achieve the aim of research, this research used text mining based on social data. This research collected 1,453,272 texts from 6,217 units of online documents which contained 'work permit system' from January to December, 2020 using Textom, and did text-mining and social network analysis. This research extracted 100 key words frequently mentioned from the analyses of data top-level key word frequency, and degree centrality analysis, and constituted job problem, importance of policy process, competitiveness in the respect of industries, and improvement of living conditions of foreign workers as major key words. In addition, through semantic network analysis, this research figured out major awareness like 'employment policy', and various kinds of ambient awareness like 'international cooperation', 'workers' human rights', 'law', 'recruitment of foreigners', 'corporate competitiveness', 'immigrant culture' and 'foreign workforce management'. Finally, this research suggested some ideas worth considering in establishing government policies on the work permit system and doing related researches.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

The Nature of Reform in the U.S., UK, Germany National Intelligence Systems and Implications for Reform of the Korean National Intelligence Service (미국·영국·독일 국가정보체계 개혁 양상과 한국 국가정보원 개혁에 대한 시사점)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.167-177
    • /
    • 2018
  • Major countries, such as the U.S., UK and Germany have reformed their national intelligence systems in the face of transnational, asymmetric and comprehensive threats since September 11, 2001 and have strengthened the intelligence capacity involved in countering terrorism and WMD proliferation, right/left extremism threats. The Korean Moon Jae-in government is preparing a reform plan to eliminate illegal political intervention and abuse of power by the National Intelligence Service(NIS) and to rebuild it as an efficient national intelligence agency for national security. In discussing the reform direction of the NIS, it is necessary to discuss in detail whether adopting a separate model of intelligence agencies to restrict domestic intelligence activities of the NIS and concentrate on foreign intelligence activities or establish new domestic intelligence agencies. Second, as for the issue of transferring anti-Communism investigation authority of the NIS to the police, it needs to be carefully considered in terms of balancing the efficiency and professionalism of intelligence agency activity in the context of North Korea's continuous military provocation, covert operations and cyber threats. Third, it should strive to strengthen the control and supervision functions of the administration and the National Assembly to ensure the political neutrality of the NIS in accordance with the democratization era, to guarantee citizens' basic rights and to improve the transparency of budget execution.

  • PDF

A Study on the Records of Presidential Impeachment in 2004 in the Public Domain (공공영역의 2004년 대통령 탄핵사건 기록)

  • Oh, Myung-Jin
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.45-78
    • /
    • 2012
  • The significance of Presidential Impeachment in 2004 is subject to interpretations in many different contexts, but its nature as its justice was the constitutional trial by the nation's impeachment system. This study set out to compare and analyze the understanding of the event centered around its nature as "an impeachment event as a public activity" and the records related to it. For that purpose, the study attempted to analyze the impeachment event to understand it as a public activity and examined and analyzed the records of the impeachment event in the public domain through personal visit, phone interview, and request of information disclosure based on the analysis results. An impeachment event as a public activity can be understood as an activity carried out by the National Assembly, which is to issue a motion for impeachment under the norms of the nation's impeachment system, and Constitutional Court, which is responsible for impeachment trial, through their unique rights prescribed in the Constitution. The important subjects of such a public activity included the accused president, the acting presidential system created by the motion for impeachment, and the National Election Commission that provided a decisive ground for impeachment. It was confirmed that the records, which are legal requirements, were well created and have been preserved and managed in the public domain. However, it was difficult to conclude that the records of the impeachment event were thoroughly created in terms of content in relation to affairs as they mainly covered the superficial treatment processes and the results of explicit activities. There was, in particular, the absence of records showing the context of activity.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

A Study on the Legal Liabilities of Contractor as a Delay in the Product Delivery on the Offshore Plant Construction Contract (해양플랜트공사계약상 제조물인도지연에 따른 당사자의 법적 책임에 관한 고찰)

  • Jin, Ho-Hyun
    • MARITIME LAW REVIEW
    • /
    • v.29 no.2
    • /
    • pp.115-144
    • /
    • 2017
  • The impact of the global financial crisis, which began in the United States in 2007, had a major impact on the domestic shipping and shipbuilding industries. In this regard, the domestic shipyard has established an order-taking strategy in several ways as an alternative to lowering the amount of construction of commercial vessels due to deterioration of the shipping industry, and selected industrial sector was the offshore plant sector. However, the domestic shipyard has under performed the offshore plant in order to just increase sales and secure work without any risk analysis for EPC contracts. As a result, the shipyard has been charged more than the initial contract price with the offshore plant contractor, or the shipyard has become a legal issue requiring payment of liquidated damages due to delays in delivery of the product. The main legal disputes are caused by the thorough risk analysis and the inexperience of process control that can occur during offshore plant construction. and In particular, there is no sufficient review of the unequivocal provisions in the contract as an element of risk management. There is no human resource to review these contractual clauses. Therefore, this study identifies the existence of specific risks that could lead to delays in offshore plant construction, and examined the existence of any unequivocal clauses in contracts for offshore plant construction. and also discussed how the toxic clause applies to the actual parties and how the concrete risk factors in the construction contracts are transferred and expressed by referring to the interviews with the project manager of the domestic shipyard and the previous research. As a result, This paper examined the legal liability of the contracting parties regarding delayed delivery of the products due to the offshore plant construction contract. And to improve the domestic shipbuilding industry.

Development Impact Based on Area Adjustment of Feasibility Review in Bukhansan National Park Planning (북한산국립공원 계획 타당성검토 구역조정의 개발 영향)

  • Cho, Woo
    • Korean Journal of Environment and Ecology
    • /
    • v.35 no.3
    • /
    • pp.305-312
    • /
    • 2021
  • This study aims to analyze the changes (2011→2021) in social and environmental factors, such as actual construction activities, including building development and officially assessed individual land price, of the areas that have been released from the park during the second national park area adjustment period (2010~2011) and compare them with those of the areas that retained parks in the same period to analyze the development impact. In the released area, a building has been constructed per 16,431 square meters since 2011. Moreover, both the number of floors and height of the building has increased, and it was analyzed that the class 2 neighborhood living facilities occupied the highest proportion of the building use. Officially assessed individual land prices increased by 42.3% in the released area and 38.6% in the retained area. The analysis by region showed that the officially assessed land price increased by 55.2% on average in both released and retained areas in Seoul and 9.4% in Gyeonggi-do, indicating a much larger increase in the Seoul region. The issue of private property rights in national parks was mostly resolved as they were released through the second national park area adjustment. However, the Korea National Park needs to promote the benefits of landowners by suggesting rational alternatives such as adjustments to the park zoning and facility planning.