• Title/Summary/Keyword: access management

Search Result 3,316, Processing Time 0.035 seconds

The Current Status and Prospect of Presidential Records Management (대통령기록관리의 현황과 전망)

  • Zoh, Young-Sam
    • The Korean Journal of Archival Studies
    • /
    • no.21
    • /
    • pp.283-322
    • /
    • 2009
  • Legislation and enforcement of the Presidential Records Management Law was an important turning point in Korean archival management history. In the past, the notion of presidential records was vague. The law was a starting point of establishing presidential records management. The Presidential Records Management Law provides the definition of presidential records and its scope, and establishes the protection of presidential records through restricted access to the records. The key to the law is to enable a president freely to produce records and transfer them to the next administration without omission. In other words, it aims to stop the practice that presidential records are produced but never be left. But, 'disputes over the release of presidential records' and the disclosing of access-restricted presidential records presented a crisis to national records management as well as the prospect of presidential records management, even if they were 'legal procedures.' The instability of presidential records management could give a serious impact on the national records management and its operation. Amid this situation, it is required to review the presidential records management system and provide recommendations for improvement, even if the enforcement of law has just started. The most urgent things in improving presidential records management are to secure its independence, specialty, and to complement restricted access to presidential records. For securing independency, presidential records management should be done by a separate organization other than the National Archives of Korea while for promoting specialty, a newly established organization could serve as a professional archive. And for complementing restricted access to the presidential records, the access should be more limited. In other words, more discretion is needed in permitting access. And more specific regulations should be applied to the permitted records. However, these regulatory actions may not have effects unless independency is not secured. Thus, more fundamentally, independency of the National Archives of Korea should be first established.

A Study on the Characteristics of Open Access in Korean Scholarly Journals: Focused on KCI Journals (국내 학술지의 오픈액세스 특성에 관한 연구: KCI 등재지를 대상으로)

  • Kim, Gyuhwan;Joung, Kyoung Hee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.251-267
    • /
    • 2017
  • This study aimed to analyze open access features of 1,890 Korean scientific journals registered in the Korea Citation Index (KCI). To this end, this study classified open access features of the target scientific journals into two main aspects, free access and free redistribution. The analysis results indicated that the target scientific journals had strong free access aspects. Based on websites, 67% of the target scientific journals allowed for free access without a login process and based on free database, 48% provided free access. On the other hand, the target scientific journals had weaker free redistribution aspects compared to their free access aspects. Only 14% of them offered the CC (creative commons) license. Another finding was that there were clear differences in open access aspects by academic field. Medicine, pharmacy, natural science, agriculture, fisheries, oceanography, and engineering had stronger open access aspects than humanities, sociology, arts, physical education, and interdisciplinary science. It appears that the difference was caused by the presence or absence of organizations supporting distribution of scientific journals of the fields concerned. To narrow the gap, it is recommended that the open access governance system is established to set up open access policies for Korean scientific journals regardless of academic fields and to support them.

A Study on Methods of Implementation for the NRF Open Access Policy (한국연구재단 오픈액세스 정책 실행방안 연구)

  • Joung, KyoungHee;Lee, Jae Yun;Chung, EunKyung;Choi, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.255-286
    • /
    • 2020
  • This study aims to identify the methods of implementation for the 'National Research Foundation of Korea Open Access 2021(Plan)'. This study covers the methods of implementation in the three following core items: 1) developing the details on the amount, method, and procedures of APC support; 2) proposing methods for facilitating the transition of domestic Korean academic journals to open access journals; and 3) developing methods of entrusting papers to open access repositories. APC support should be guaranteed at a reasonable level. The average or median of APC values for the previous three years will be applied to set the upper limit for support each year. APC support will be provided when the paper is published to open access journals or transitioning journals to open access. Hybrid journals or dual access journals are not included. Support for open access publishing of academic journals in Korea during the transition period will be available for open access journals that have registered for CCL in KJCI or journals that have submitted their application for transitioning to open access. Publishing in hybrid, dual access or subscription-based journals must be accompanied by items related to copyright such as embargo. Research results will be used for the detailed implementation plan of 'NRF OA2021 (Plan)'. They will serve as the base data for the rapid, stable, and sustainable implementation of open access policy in NRF, addressing the Korean domestic academic journal publishing environment and the field of international academic communication.

Heuristic Algorithms for Optimization of Energy Consumption in Wireless Access Networks

  • Lorincz, Josip;Capone, Antonio;Begusic, Dinko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.626-648
    • /
    • 2011
  • Energy consumption of wireless access networks is in permanent increase, which necessitates development of more energy-efficient network management approaches. Such management schemes must result with adaptation of network energy consumption in accordance with daily variations in user activity. In this paper, we consider possible energy savings of wireless local area networks (WLANs) through development of a few integer linear programming (ILP) models. Effectiveness of ILP models providing energy-efficient management of network resources have been tested on several WLAN instances of different sizes. To cope with the problem of high computational time characteristic for some ILP models, we further develop several heuristic algorithms that are based on greedy methods and local search. Although heuristics obtains somewhat higher results of energy consumption in comparison with the ones of corresponding ILP models, heuristic algorithms ensures minimization of network energy consumption in an amount of time that is acceptable for practical implementations. This confirms that network management algorithms will play a significant role in practical realization of future energy-efficient network management systems.

THE USE OF MOBILE COMPUTERS FOR CONSTRUCTION PROJECTS

  • Chul S. Kim
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.956-961
    • /
    • 2009
  • When construction engineers perform their work in the jobsite, they have to record as-built conditions in the project log (Data Collection). On the other hand, the engineers often have to refer to the construction documents when necessary at the job faces (Data Access). The practice of Data Collection and Data Access in the jobsite can be greatly enhanced by utilizing mobile computing with wireless communications. In this paper, two cases of mobile computing applications for construction field management are presented; Mobile Specifications System and Mobile Data Collection System. The demonstration of the process for developing two mobile applications is the primary purpose of the paper. The problems and issues involved with adopting mobile computing for construction field are also presented. The simple information framework for mobile computing has been also proposed as an outcome of the research. As for development tools, readily available relational database and wireless network have been used. The use of commercial mobile broadband was examined for data communication where local area network is not available.

  • PDF

Access to and Utilization of the Open Source Data-related to Adolescent Health (청소년 건강관련 공개자료 접근 및 활용에 관한 고찰)

  • Lee, Jae-Eun;Sung, Jung-Hye;Lee, Won-Jae;Moon, In-Ok
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.11 no.1
    • /
    • pp.67-78
    • /
    • 2010
  • Background & Objectives: Current trend is that funding agencies require investigators to share their data with others. However, there is limited guidance how to access and utilize the shared data. We sought to determine what common data sharing practices in U.S.A. are, what data-related to adolescent health are freely available, and how we deal with the large dataset adopting the complex study design. Methods: The study included only research data-related to adolescent health which was collected in USA and unlimitedly accessible through the internet. Only the raw data, not aggregated, was considered for the study. Major keywords for web search were "adolescent", "children", "health", and "school". Results: Current approaches for public health data sharing lacked of common standards and varied largely due to the data's complex nature, large size, local expertise and internal procedures. Some common data sharing practices are unlimited access, formal screened access, restricted access, and informal exclusive access. The Inter-University Consortium for Political and Social Research and the Center for Disease Control and Prevention were the best data depository. "Data on the net" was search engine for the website providing data freely available. Six datasets related to adolescent health freely available were identified. The importance and methods of incorporating complex research design into analysis was discussed. Conclusion: There have been various attempts to standardize process for open access and open data using the information technology concept. However, it may not be easy for researchers to adapt themselves to this high technology. Therefore, guidance provided by this study may help researchers enhance the accessibility to and the utilization of the open source data.

  • PDF

A Study on the Description of Archives Name by Controlled Access Point in Ontology (기록물 생산기관명 접근점 제어 온톨로지 기술에 관한 연구)

  • Kang, Hyen Min
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.3
    • /
    • pp.147-164
    • /
    • 2018
  • This study defined the name of records producing institution as the unique preferred form of access point which has same identification and same entity by using Standard Administration Code, and also described the name of records producing institution which has various name form as formal-name form of access point, which has same identification and same entity. This study make us be able to identify and access to all of the records that institution, has same identification and same entity, has produced. And the mechanic, I designed by ontology would make reinforce 'the principle of provenance' and 'respect for orignal order' and make user satisfy in useability of archives and expanded retrieval results.

The Access-Enhanced Search Interface Design for Korean Paintings (다양한 접근점 기반의 한국화 검색 인터페이스에 관한 연구)

  • Seo, Eun-Gyoung;Lee, Won-Kyung
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.2
    • /
    • pp.25-48
    • /
    • 2008
  • The purpose of this study is to suggest retrieval interfaces for Korean paintings which support users to retrieve specific digitalized images of them through various access points and to widely browse based on unique features Korean paintings. The study, first, develops a set of descriptive elements suitable for Korean Paintings. Twenty-six core elements and one hundred seventy-two attributes are selected as descriptive items for Korean paintings based on the opinion of 8 experts. Then, to gam realistic evidence of what descriptive elements of image serve users as access points, it is investigated which elements are used as retrieval access points among 26 core elements by 300 peered users who are consisted with two groups such as common users and domain specialists. The study, in final, designs two(general and advanced) types of search interfaces and display interfaces based on the most popular top 15 descriptive elements. This access-enhanced platform which enables user-oriented searches will satisfy users in image retrieving.

A Database Security System for Detailed Access Control and Safe Data Management (상세 접근 통제와 안전한 데이터 관리를 위한 데이터베이스 보안 시스템)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Hong, Sung-Jin;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.352-365
    • /
    • 2009
  • Recently, data access control policies have not been applied for authorized or unauthorized persons properly and information leakage incidents have occurred due to database security vulnerabilities. In the traditional database access control methods, administrators grant permissions for accessing database objects to users. However, these methods couldn't be applied for diverse access control policies to the database. In addition, another database security method which uses data encryption is difficult to utilize data indexing. Thus, this paper proposes an enhanced database access control system via a packet analysis method between client and database server in network to apply diverse security policies. The proposed security system can be applied the applications with access control policies related to specific factors such as date, time, SQL string, the number of result data and etc. And it also assures integrity via a public key certificate and MAC (Message Authentication Code) to prevent modification of user information and query sentences.

Performance Improvement Method of Multi-Port Memory Controller Using An Effective Multi-Channel Direct memory Access Management (효과적인 다채널 직접 메모리 접근 관리를 통한 멀티포트 메모리 컨트롤러의 성능 향상 방법)

  • Chun, Ik-Jae;Lyuh, Chun-Gi;Roh, Tae Moon;Lee, Moon-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.33-41
    • /
    • 2014
  • This paper presents an effective memory access method for a high-speed data transfer on mobile systems using a direct memory access controller that considers the characteristics of a multi-port memory controller. The direct memory access controller has an integrated channel management function to control multiple direct memory access channels. The channels are physically separated and operate independently from each other. Experimental results show that the proposed direct memory access method improves the transfer performance by up to 72% and 69% on read and write transfer cycles, respectively. The total number of transfer cycles of the proposed method is 63% less than in a commercial method under 4-channel access.