• Title/Summary/Keyword: legal information service

Search Result 345, Processing Time 0.027 seconds

Non-repudiation Protocol for Efficiency and Fairness in TTP Security Service Level (TTP 보안 서비스 레벨에서 효율성과 공정성을 고려한 부인봉쇄 프로토콜)

  • 박상준;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.24-32
    • /
    • 2001
  • Recently, in the case that provides electronic services using Internet, we need the non-repudiation service that supplies a technological evidence about actions between a sender and a receiver that violate the promised protocol. Also, this service offers legal evidences while producing controversy. In this paper, we propose a protocol that improves the efficiency and offers the fairness of non-repudiation service by the extension of ability of TTP (Trusted Third Party). The proposed protocol adds a Time Check function and an Alert Message to extend the ability of TTP. Through the computer simulation, we prove that the proposed protocol has better efficiency than previous protocols.

  • PDF

The Legal Aspect of Supreme Court Cases on the Unlicensed Medical Practice of Korean Medicine (대법원 판례로 살펴본 무면허 한방의료행위의 법리)

  • Lee, Hai-Woong
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.23 no.1
    • /
    • pp.15-26
    • /
    • 2019
  • Background and Aim : Health care and cosmetics as well as quality of life is now a matter of concern and many categories of complementary and alternative medicine fall into the territory of the medical practice of Korean medicine. Accordingly, penalties are being taken for unlicensed medical practices of Korean medicine in so called complementary and alternative medicine area. There is a possibility of violating the law for the public part because it is not clearly stipulated in the law as to what is a licensed medical practice. Materials and Method : The significance of the Medical Service Act and the Act on Special Measures for the Control of Public Health Crimes were reviewed, and the related supreme court cases were discussed upon the legal aspect of processing the unlicensed medical practice of Korean medicine. The legal information was provided from the National Law Information Center of the Ministry of Government Legislation, and the information websites of the Supreme Court and the Constitutional Court. Results : The concept of medical practice, which is essential in judging the case of unlicensed medical practice, is 'prevention and treatment of diseases through diagnosis, examination, prescribing, medication, or surgical procedures based on medical expertise', and the 'acts that may result in harm and injury of health unless performed by a medical person'. With respect to the medical practice of Korean medicine, the concept includes 'prevention and treatment of diseases using the principle of traditional Korean Medicine'. Conclusions : The concept of medical practice should be clearly stipulated in the law for the control over the unlicensed medical practices of Korean medicine. And it is important to move from the current concept of medical person-oriented medical practice emerging from the national system of healthcare control, to a concept that can accept the era of health managing-oriented medical environment and the co-governance of the healthcare providers and consumers for the future.

Daily Living Service Flowing in Skilled Nursing Facilities for the Elderly -Focused on Dining and Bathing Area- (노인전문요양시설의 일상생활 지원 서비스 작업흐름 분석 -식사 및 목욕공간을 중심으로 -)

  • Lee Min Ah
    • Journal of Families and Better Life
    • /
    • v.22 no.6 s.72
    • /
    • pp.1-11
    • /
    • 2004
  • The purpose of this study was to provide basic information about efficient space use in the dining and bathing area through the analysis of service flowing. Four researchers observed the service flowing and the using behavior at those areas. The results of the study were as follows: Dining service was proceeded as resident moving, waiting, meal serving, dining, moving and arranging in order. The waiting stage was one of the problematic processes since the staffs made the residents wait to) long at a fixed position. The program right before the meal serving will be helpful for reducing tediousness of the elderly residents. Another problem was that the area was not big enough for the meal sowing. The legal regulation Is needed to prescnbe for the size of dining area per resident. The flowing of bathing service was proceeded as staff preparation, moving, waiting, undressing, bathing, drying, dressing, moving and arranging in order. There were more problems in the dressing area than in the bathing area. The elderly with stretcher or wheelchairs had difficulty in entering the narrow doorway. The dressing area was so crowded with the staffs, undressed elderly, dressed elderly, and other laundries. The division of dressing and undressing area is required to avoid the confusion of the users in the area.

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

An Advanced Model for Week Point Analysis and Evaluation on Important Information Communication Infrastructures (주요 정보통신 기반시설 취약점 분석 및 평가절차 모델 개선 연구)

  • Choi, Woong Gyu
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.43-48
    • /
    • 2012
  • As the major information communication infrastructure had been getting more important, 'Act on the Protection of Information and Communications Infrastructure'(APICI) was legislated in Korea 2001. Consequently, the major information system, nationwide monitering service systems and government administration operation & management systems have been registered and managed under the APICI. The authorized organizations related to above service and system, perform vulnerability analysis and evaluation for chief communication infrastructures by themselves or registered agencies. In this research, we propose an advanced model for vulnerability analysis and evaluation and apply it to the main information and communication infrastructures through the case study. We hope each related organization could apply this model for analysis and evaluation of vulnerability in these infrastructures.

On the Library Administrative Systems and Legislations in Russia (러시아의 도서관 행정.법제에 관한 고찰)

  • Yoon Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.3
    • /
    • pp.23-40
    • /
    • 2004
  • The purpose of this paper is to overview the administrative system and legislation of Russia's libraries with priority given to public library. After the breakup of the Soviet Union in 1991, Russia began to set up a new political, legal, and economic system. Russia has about 51,000 public libraries. Most towns and large villages have a public library As a rule, public libraries are unified in centralized systems coincident in their location with administrative regions. The great majority of public libraries are part of a network subordinated to the Ministry of Culture of the Russian Federation. Library legislation is an important guarantee of the success of library service. Two definitive federal laws were enacted in 1994, Library Law and Legal Deposit Copy Law. In 2001, the Russian Library Association adopted the Model Standard for Public Library. It has a recommendatory character and it is addressed to both librarians and local authorities.

  • PDF

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

A Study on the Optimal Development Direction of the Land Management Information Systems (토지종합정보망시스템의 고도화 구축 방안에 관한 연구)

  • O, Jong-U
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.05a
    • /
    • pp.289-311
    • /
    • 2004
  • The purpose of this study is to analyze the optimal development direction of the land management information systems in Korea. In order to produce a new LMIS model the existing model of Tulloch(1996) was evaluated. Analysis of the land management information systems(LMIS) is focused on the period of 1998 and 2001. The main results of the study are as follows: First, the government should involve GIS(Geographic Information Systems) into the e-government. Second, the KLIS(Korea Land Information Systems) is required technological and legal infrastructure for the service using optimized land management information systems as combining LMIS and PBLIS(Parcel based Land Information Systems). Third, the spatial data of the LMIS can be promoted by ensuring reliable IT environments. Forth, optimized LMIS should be revised to reflect the new technological environment and collaborative relationship between LIS and GIS boundaries and between LMIS, urban infrastructure, and related information sectors. Fifth, In terms of services LMIS is required focusing end users rather than supplier focused strategy.

  • PDF

Research on legal improvement measurements on drone use

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.147-153
    • /
    • 2017
  • The main subject of year 2016 Davos forum was "The 4th Industrial Revolution." Recently, interests and investment in drone market, so called industrial revolution in the sky is growing in many countries around the world. Before, drone was used for military purpose such as reconnaissance or attacking but today, it is used in various private sectors such as unmanned delivery service, agriculture, leisure activities, etc. Presently, many major countries in the world are already involved in the 'war without gunfire' to be dominant in this drone industry. Korean government also has announced an extreme relaxation of regulations for growing drone industry by opening a conference with Ministers related to economics. During the conference, business scope of drone which was limited to agriculture, photographing, and observation was expanded to all the fields except for cases hindering national safety and security. In terms of shooting purpose drone its process of receiving approval for flight and shooting is simplified to online registration. What is more, drone delivery service will be allowed in island areas such as Goheung, Yeongwol, etc from first term of year 2017. Finding the way to apply drone in criminal investigation is also speeding up. Recently, Public Safety Policy Research Center in Korean National Police University has inquired for research service and its result will be out around November. Likewise, although more and stronger foundation for supporting drone industry is made but there are still, some opinions saying that we should take a careful approach in consideration to the side effect such as abuse in crime. One may also try terror by placing a dangerous substance. If drone falls, it may hurt any civilians. Moreover, if shopping purpose drone is hacked, it may result in violation of privacy. Compared to America, Europe, and China, we are at the very beginning stage of drone industry and it is necessary to reorganize legal issues to grow this industry. This can be thought from two perspectives; first, the growth of drone industry is blocked by difficult regulations on Aviation Law and Radio Regulation Law. The second issue is the safety and privacy that are required for operating drone. For the advanced technologies to make human life more profitable, more active and proactive actions are required by criminal law side. In preparation to the second mechanical era where man and machines should go together, I hope that responsible preparation is required in all fields including the criminal law.

Tackling Privacy Paradox : Protecting Right to Self-determination of Personal Information by Estimating the Economic Value of Personal Information and Visualizing the Price

  • Lim, Sejoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.244-259
    • /
    • 2021
  • The economic value of personal information has its importance as an objective measure of valuation in commercial, legal, and policy areas. Until recently, however, personal information subjects have not properly recognized the economic value of personal information, which has led to the inability to exercise the right to self-determination of personal information by unconsciously agreeing to the terms and conditions of personal information service without recognizing the value of personal information provided to the service provider when subscribing to a specific service. Therefore, we will examine the methodologies for calculating the economic value of personal information and the practical guarantee of the right to self-determination of personal information and analyze the economic value of personal information through a survey. Also, we would like to propose various ways for the subject of personal information with limited cognitive resources to visually accept the economic value of personal information required by the terms and conditions and suggest the optimal visualization of personal information economic value to exercise the right to self-determination of personal information. To do so, in this paper, we have conducted two survey experiments to estimate the economic value of personal information. Based on the price of personal information by category retrieved from surveys, we have visualized the price of personal information in various forms and asked respondents to choose the optimal infographic that best represents the value of personal information visually. As a result, we have proposed an optimal usage of the infographic to 'nudge' information subjects about their right to self-determination of personal information, therefore opening the possibility of diminishing privacy paradox.