• Title/Summary/Keyword: access to information

Search Result 8,975, Processing Time 0.048 seconds

Commitment to Global Open Access Transition Collaboration: Outcomes and Lessons from SCOAP3-Korea

  • Jung, Youngim;Kim, Hwanmin
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.46-55
    • /
    • 2022
  • Eight years have passed since the Sponsoring Consortium for Open Access Publishing in Particle Physics (SCOAP3) was launched. SCOAP3 is one of the most successful global partnerships and funds for Open Access and has been benchmarked by other Open Access initiatives. The Korea Institute of Science and Technology Information (KISTI) joined as the first Asian partner in 2011, and has supported its shared vision and contributed its financial commitment since the beginning of SCOAP3. SCOAP3-Korea is the first bottom-up collaboration for local libraries to re-direct funds previously used for subscriptions to Open Access publishing. This paper explores the roles and responsibilities of KISTI in the Open Access quest. It describes the commitment to SCOAP3 in South Korea, including how the collaboration model for SCOAP3-Korea differs from the global model. This paper also discusses the impact of SCOAP3-Korea by analyzing publications affiliated by Korean authors in SCOAP3 journals for the last six years (2014-2019). We have integrated the national R&D project and research outcome data from NTIS (National Science and Technology Information Service) to investigate the research articles benefited by SCOAP3 and research publications in non-SCOAP3 journals. The positive impact of SCOAP3 in increasing research publication in the discipline was revealed compared to non-SCOAP3 journals. In addition, the financial benefit of SCOAP3-Korea has been proven. With regard to the investment for readers, $137,094 USD was saved during the SCOAP3 Phase 1 and 2, while $748,923 USD was saved with regard to publication fees. We discussed the lessons from SCOAP3-Korea for commitment to a larger-scale Open Access transition.

A Three-way Handshaking Access Mechanism for Point to Multipoint In-band Full-duplex Wireless Networks

  • Zuo, Haiwei;Sun, Yanjing;Lin, Changlin;Li, Song;Xu, Hongli;Tan, Zefu;Wang, Yanfen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3131-3149
    • /
    • 2016
  • In-band Full-duplex (IBFD) wireless communication allows improved throughput for wireless networks. The current Half-duplex (HD) medium access mechanism Request to Send/Clear to Send (RTS/CTS) has been directly applied to IBFD wireless networks. However, this is only able to support a symmetric dual link, and does not provide the full advantages of IBFD. To increase network throughput in a superior way to the HD mechanism, a novel three-way handshaking access mechanism RTS/SRTS (Second Request to Send)/CTS is proposed for point to multipoint (PMP) IBFD wireless networks, which can support both symmetric dual link and asymmetric dual link communication. In this approach, IBFD wireless communication only requires one channel access for two-way simultaneous packet transmissions. We first describe the RTS/SRTS/CTS mechanism and the symmetric/asymmetric dual link transmission procedure and then provide a theoretical analysis of network throughput and delay using a Markov model. Using simulations, we demonstrate that the RTS/SRTS/CTS access mechanism shows improved performance relative to that of the RTS/CTS HD access mechanism.

Assessment and Support Measures of Academic Journals in the National Open Access Platform AccessON

  • Hyekyong Hwang;Eun Jee Lee;Wan Jong Kim;Jin Ho Park
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.3
    • /
    • pp.75-88
    • /
    • 2024
  • This study aims to assess the maturity of Korean open access (OA) journals using the OA infrastructure provided by the Korea Institute of Science and Technology Information, and develop necessary strategies for future improvement. The assessment model consists of three dimensions, 12 items, and 24 sub-items. The importance of the three dimensions (A: OA policy establishment and disclosure, B: OA sustainability, and C: Journal openness quality) was differentiated by the Analytic Hierarchy Process, and the maturity stages were divided into five levels (Entry, Growth1, Growth2, Maturity1, and Maturity2). The assessment was carried out twice for 100 academic journals. The results indicated that the proportion of journals at or above the Growth1 level increased by 11% to reach 83% during the second assessment phase, which could be owing to the learnings of the first assessment. Following expert consultations on the assessment results, three support measures were identified to activate OA. The first includes OA promotion and education activities, which involve creating standard regulations and guidelines, and advancing educational activities for societies that are either preparing for or currently implementing OA. The second involves providing support for technical aspects, such as identifiers, XMLization, and copyright management, through peer review and OA publishing platforms. The third includes collaborative activities to enhance journal evaluations and the recognition criteria for researchers' achievements in OA journals, and fostering cooperation with national and research and development institutions for financial support.

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

  • Sadikin, Rifki;Park, Young Ho;Park, Kil Houm
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.

The Impact of Facebook Access Motivation on Facebook Addiction among High School Students: The Mediator Role of Online Self-Disclosure

  • Lee, Eunhee
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.103-112
    • /
    • 2019
  • Online self-disclosure was hypothesized as a mediating variable, explaining the relationship between Facebook access motivation (relationship expansion, curiosity about others' life, maintenance of social connection, social pressure from others, habitual use, impression management, searching for information, and content sharing) and Facebook addiction. Data came from 407 high school students in the Busan, and Gyeongnam provinces. Structural analysis was used to specify the relations among measured construct. Facebook access motivation of curiosity about others' life, Facebook access motivation of maintenance of social connection, Facebook access motivation of social pressure from others, Facebook access motivation of habitual use, and Facebook access motivation of impression management were significant predictors of Facebook addiction. Online self-disclosure mediates between Facebook access motivation of curiosity about others' life, Facebook access motivation of social pressure from others, Facebook access motivation of searching for information & Facebook access motivation of content sharing and Facebook addiction. Viewing online self-disclosure as a mediator has important implications for social media addiction counseling practice.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

Problems on ownership and access in future librarty (미래도서관에서의 소장(ownership)과 접근(access)의 문제)

  • 양재한
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.19-50
    • /
    • 1996
  • The purpose of this paper is to study on ownership and access in future library. For this purpose, this is criticized about recognition regarding future library of Library and Information Science researchers in Korea. And, this is reviewed the present stages of collection development and a role of future books, future libraries and future librarians in Korea. The result of this study is known unrealistic reality analysis and forecast surrounding future library discourse and at the same time that following Western model is not fit for future library in Korea. This study is proposed resolving of problems to access based on physical collection in future library.

  • PDF

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

A Study on An Architecture of the Security improved Document DRM for preventing Information Leakage in Military Information System Environment (국방 정보시스템 환경에서 정보유출 방지를 위한 보안성이 강화된 문서 DRM 설계에 관한 연구)

  • Eom, Jung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.41-49
    • /
    • 2011
  • We designed a security improved document DRM for protecting document based military information which is transmitted in the military information system environment. The user should be could not access document which not related to his/her role and duty, and must view the only document appropriate for his/her role and security level according to the security level of document. We improved the security of document DRM by adding to the access control module in DRM server. Our system allows operation mode authorizations for the document, considering the user's role & security level and the security level of document. And it prevents indiscriminate access to the document and damage the confidentiality and integrity of information.

The implementation of Access Control System using Biometric System (Biometric System(fingerprint Reader)을 이용한 Access Control System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.439-442
    • /
    • 2003
  • In this paper, a system that implementation of Access Control System Using Biometric System. Biometrics is science which deals with verifying or recognizing using physiological or behavioral characteristic Access Control System uses Biometric system to make an access control system. Biometrics goes under the study of bio-recognition or bio-measurement. It is a technology or study that identifies individuals using one's Biometric character. Access control system is a system used to identify one's entrance and exit, personal management, and security. Access control system can be joined with Biometric system to produce easier use and more sufficient effects. Access control system using Wiegand (Data Format) signal output, can replace earlier RF Card systems and make an access control (security) system. It uses RS-232, Rs-422 or TCP/IP type communication with the computer so an embedded system can be controlled using the software.

  • PDF