• Title/Summary/Keyword: internet Governance

Search Result 74, Processing Time 0.021 seconds

The Evolutionary Trends and Influential Factors Analysis of Agricultural Trade between South Korea and RCEP Member Countries

  • Qianli Wu;Jinyan Tian;Haiyan Yu;Ziyang Liu
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.73-86
    • /
    • 2024
  • With the acceleration of regional economic integration, the agricultural trade network within the RCEP region presents new opportunities and challenges for member countries. This study focuses on agricultural trade among RCEP members from 2011 to 2020, utilizing social network analysis to explore the structural characteristics and evolutionary trends of the trade network. Additionally, an extended gravity model is employed to empirically analyze the key factors influencing South Korea's agricultural trade with other member countries. The findings reveal that: (1) Agricultural trade relationships within the RCEP region are stable and mature, with high interconnectivity in the trade network, indicating a trend towards balanced development. (2) The positions of member countries within the agricultural trade network are characterized by both high density and heterogeneity. (3) South Korea's agricultural trade with RCEP member countries is positively influenced by the economic size, population size, and governance level of its trading partners, while South Korea's own indicators show no significant effect. The trade distance between South Korea and member countries also has a positive impact on agricultural trade. By combining social network analysis with an extended gravity model, this study provides a multi-faceted quantitative analysis of the RCEP agricultural trade network, offering new insights into regional agricultural trade. It also provides empirical evidence for agricultural trade cooperation between South Korea and other RCEP countries.

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

Roadmap Toward Certificate Program for Trustworthy Artificial Intelligence

  • Han, Min-gyu;Kang, Dae-Ki
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.59-65
    • /
    • 2021
  • In this paper, we propose the AI certification standardization activities for systematic research and planning for the standardization of trustworthy artificial intelligence (AI). The activities will be in two-fold. In the stage 1, we investigate the scope and possibility of standardization through AI reliability technology research targeting international standards organizations. And we establish the AI reliability technology standard and AI reliability verification for the feasibility of the AI reliability technology/certification standards. In the stage 2, based on the standard technical specifications established in the previous stage, we establish AI reliability certification program for verification of products, systems and services. Along with the establishment of the AI reliability certification system, a global InterOp (Interoperability test) event, an AI reliability certification international standard meetings and seminars are to be held for the spread of AI reliability certification. Finally, TAIPP (Trustworthy AI Partnership Project) will be established through the participation of relevant standards organizations and industries to overall maintain and develop standards and certification programs to ensure the governance of AI reliability certification standards.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost

Is this New Paradigm to International Information Order in 21th Century?: The Review of Historical Context and Agenda of World Summit on the Information Society (21세기 국제정보질서의 새로운 패러다임?: 정보사회 세계정상회의(WSIS)의 역사적 맥락과 의제 검토)

  • Kim, Eun-Gyoo
    • Korean journal of communication and information
    • /
    • v.34
    • /
    • pp.34-62
    • /
    • 2006
  • The World Summit on the Information Society (WSIS) was held in two phases. The first phase took place in Geneva, December 2003, and the second phase took place in Tunis, November 2005. The objective of the WSIS was to establish the foundations for an Information Society for all, reflecting all the different interests at stake. In relation to, this article explore the vision and paradigm of WSIS. For this, this article review the historical context of International information order and International agreements, and examine the issues of WSIS. As a result, I recognize, It is valuable that the process of WSIS for Global governance was held among governments and other stakeholders, i.e. the private sector, civil society and international organization. In addition, developing countries's voice are deeply reflected on the WSIS. It is noticeable that ITU played key role as coordinator. However, we are anxious that WSIS's vision for Information society have a bias toward Technology determinism. Eventually, this article argue that WSIS discourse is the lack of any serious and critical structural analysis of the politico-economic context.

  • PDF

A Study on the Failure Factors of Popular Use of International Domain Names (IDNs): Focusing on the International Standardization Process (다국어도메인의 대중화 실패 요인 탐색: 국제표준화 과정 분석을 통하여)

  • Lee, Jin-Rang
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.43-63
    • /
    • 2016
  • This research analyzes the international standardization process by observing the international communication sources in order to understand the reason of its current poor use. Using the 'organizing theory' frame, we observe the initial discourse on the need of internationalized domain names in ICANN and the process of negotiation for technical choice of layers. Lastly, we take Korean domain names as a case study in order to understand the conflict and the cooperation of different stakeholders. We summarize the factors of failure of IDN as follows. First, the need of IDN in the beginning was raised around non-English speaking countries, in Asia and Middle East, with the discourse on 'digital divide solution and cultural value' ICANN rather pursues the 'technical stability of Internet Infrastructure', which made its standardization take as long as 10 years. As a result, a variety of standards and services are proposed in the marketplace, which engendered inefficient competition and domain name-related disputes such as cybersquatting, technical instability and confusion of users. In addition, the government agencies fail to present the appropriate policies adjusting multiple interests of different stakeholders.

Control Variables of Remote Joint Analysis Realization on the M2M Case

  • Lim, Sung-Ryel;Choi, Bo-Yun;Lee, Hong-Chul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.98-115
    • /
    • 2012
  • New trend called ubiquitous leads the recent business by standardization and integration. It should be the main issue how to guarantee the integration and accountability on each business, especially in mission critical system which is mainly supported by M2M (Machine to Machine) control mechanism. This study is from the analysis of digital forensics case study that is from the M2M Sensing Control Mechanism problem of the "Imjin River" case in 2009, where a group of family is swept away to death by water due to M2M control error. The ubiquitous surroundings bring the changes in the field of criminal investigation to real time controls such as M2M systems. The needs of digital forensics on M2M control are increasing on every crime scene but we suffer from the lack of control metrics to get this done efficiently. The court asks for more accurately analyzed results accounting high quality product development design. Investigators in the crime scene need real-time analysis against the crime caused by poor quality of mission critical systems. It seems to be every need of Real-Time-Enterprise, so called ubiquitous society on the case. We try to find the efficiency and productivity in discovering non-functional design defects in M2M convergence products focusing on three metrics in study model with quick implementation. Digital forensics system in present status depends on know-how of each investigator and is hard to expect professional analysis on every field. This study set up a hypothesis "Co-working of professional investigators on each field will qualify Performance and Integrity" especially in mission critical system such as M2M and suggests "Online co-work analysis model" to efficiently detect and prevent mission critical errors in advance. At the conclusion, this study proved the statistical research that was surveyed by digital forensics specialists around M2M crime scene cases with quick implementation of dash board.

Development of Product Recommendation System Using MultiSAGE Model and ESG Indicators (MultiSAGE 모델과 ESG 지표를 적용한 상품 추천 시스템 개발)

  • Hyeon-woo Kim;Yong-jun Kim;Gil-sang Yoo
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.69-78
    • /
    • 2024
  • Recently, consumers have shown an increasing tendency to seek information related to environmental, social, and governance (ESG) aspects in order to choose products with higher social value and environmental friendliness. In this paper, we proposes a product recommendation system applying ESG indicators tailored to the recent consumer trend of value-based consumption, utilizing a model called MultiSAGE that combines GraphSAGE and GAT. To achieve this, ESG rating data for 1,033 companies in 2022 collected from the Korea ESG Standard Institute and actual product data from N companies were transformed into a Heterogeneous Graph format through a data processing pipeline. The MultiSAGE model was then applied in machine learning to implement a recommendation system that, given a specific product, suggests eco-friendly alternatives. The implementation results indicate that consumers can easily compare and purchase products with ESG indicators applied, and it is anticipated that this system will be utilized in recommending products with social value and environmental friendliness.

Web3.0 Video Streaming Platform from the Perspective of Technology, Tokenization & Decentralized Autonomous Organization

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.149-160
    • /
    • 2024
  • For examining Web3.0 video streaming (VS) platforms in terms of the decentralized technology, tokenization and decentralized autonomous organization (DAO), we look at four platforms like DLive, DTube, Livepeer, and Theta Network (Theta). As a result, DLive which firstly partnered with Medianova for CDN and with Theta for peer to peer (P2P) network and migrates to Tron blockchain (BC), receives no commission from what creators earn, gives rewards to viewers by measuring engagement, and incentivizes participation by allowing 20% of donation & fees for funding development, 5% to BitTorrent Token (BTT) stakeholders (among these 5%, 20% to partners, 80% to other BTT stakeholders). DTube on its own lower-layer BC, Avalon, offers InterPlanetary File System (IPFS), gives 90% of the created value to creators or curators, and try to empower the community. Livepeer on Ethereum BC offers decentralized CDN, P2P, gives Livepeer Token (LPT) as incentive for network participants, and delegators can stake their LPT to orchestrators doing good. Theta on its native BC pulls streams from peering caching nodes, creates P2P network, gives Theta utility token, TFUEL for caching or relay nodes contributors, and allows Theta governance token, THETA as staking token. We contribute to the categorization of Web3.0 VS platforms: DLive and DTube reduce the risk of platform censorship, promote the diverse content, and allow the community to lead to more user-friendly environments. On the other hand, Livepeer and Theta provide new methods to stream content, but they have some differences. Whereas Livepeer focuses on the transcoding layer, Theta concentrates both on the video application layer and content delivery layer. It means, Theta tries to deliver value to all participants by enhancing network quality, reducing CDN cost, and rewarding users in utility tokens for the storage and bandwidth they provide.

A Study on Utilization of ORCID based Author Identifier at National Level (국가 차원의 ORCID 기반 저자 식별자 활용에 관한 연구)

  • Kim, Eun-Jeong;Noh, Kyung-Ran
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.3
    • /
    • pp.151-174
    • /
    • 2017
  • The diffusion of the internet, the advancement of ICT technology, and digital diffusion have facilitated the streamlining and acceleration of scholarly communication and speeding up research, and the paradigm of scholarly information dissemination is changing. This study introduces the ORCID, a unique author identifier, and examines the ORCID organization's activities, the advantages given to researchers and research institutes, and the membership status. In addition, this paper examines adoptions and utilizations of ORCID in major countries including USA, UK, Italy, and China. Based on this, this paper suggests the necessary considerations for utilizing ORCID in terms of governance, system elements, policy and institutional aspects in an effort to identify authors at national level.