• Title/Summary/Keyword: users' rights

Search Result 193, Processing Time 0.024 seconds

Internet Users' Willingness to Expression and Perception of Public Opinion: The Comparison between Real Space and Cyber Space (인터넷 이용자의 여론 지각과 의견 표현: 현실공간과 사이버공간의 비교)

  • Han, Hye-Kyoung
    • Korean journal of communication and information
    • /
    • v.23
    • /
    • pp.189-221
    • /
    • 2003
  • This study compares the influence of perceived public opinion on Internet users' willingness to expression in real space with in cyber space. In real space, people who perceive their opinions as minority opinion are reluctant to express theirs publicly because of fear of isolation. But cyber space is the anonymous world. So we can expect that people express their opinions freely without the fear of isolation in this space. This study's results provide the support for our expectation. In cyber space, the minority perception group has as the high willingness to expression of their opinion about the abrogation of the Korean Family Rights Raw as the majority perception group. Both of in cyber space and in real space, it is the perception failure group that makes discrepancy in the willingness to expression. This group has the lowest willingness to expression in both space. However, the other predictors of willingness to expression in cyber space are similar to those in real space. Issue salience, Communication apprehension, and Age are the very significant predictors of willingness to expression in both spaces. Sex and ideology are significant predictors in real space, while the frequency of online conversation is the significant predictor in cyber space.

  • PDF

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

A Key Management Scheme without Re-encryption for Home-domain Contents Distribution in Open IPTV Environments (Open IPTV 환경에서 재암호화 과정 없는 댁내 컨텐츠 분배를 위한 키관리 기법)

  • Jung, Seo-Hyun;Roh, Hyo-Sun;Lee, Hyun-Woo;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.57-66
    • /
    • 2010
  • Due to the advancement of IPTV technologies, open IPTV services are a step closer to becoming reality. In such service environment, users are able to enjoy IPTV services using a variety of devices available at their home domain. However, it is impossible to get such flexible services at their convenience unless each of devices is individually connected to Set-Top-Box (STB) because of Conditional Access System (CAS) or service providers otherwise allow STB to freely distribute decoded contents to every user devices attached to STB. In this paper, we propose a key management scheme for securely distributing contents from STB to multiple user devices at home domain. The proposed scheme also makes the service providers be able to control the access rights to each of user devices without installing individual STBs. It is achieved by computationally dividing a private key of RSA signature scheme into three parts and thus makes possible to distribute the contents scrambled through a underlying CAS mechanism without re-encrypting them that the existing scheme should employ. It improves significantly computation and communication complexities, maintaining it as secure as the existing schemes. Additionally, it prevents misbehaving users from illegally distributing the contents from STB to their devices available at home domain.

A Study on Compensation for Damage in Civil Litigation of Japanese Long-term Care Facilities (개호사고에서 손해배상책임에 관한 연구 -일본의 판례를 중심으로-)

  • Jeong, Da-Young
    • The Korean Society of Law and Medicine
    • /
    • v.19 no.2
    • /
    • pp.173-207
    • /
    • 2018
  • Japan is a super-aged society where the proportion of the people aged over 65 is exceeded 20%. Therefore, there are many accidents that occur in long-term care facilities in Japan, and there are many civil litigations. The Japanese court has acknowledged in many cases that the long-term facility is responsible for the damage to the elderly who is injured in the facility. The cases can be divided into ① tumbling down, ② wandering, ③ suffocation, ④ bedsore, and ⑤ accidents among the facility-users. In most cases, the court found that the facility violated its obligation to protect their users. This is not only the case where the manager or the employee of the facility violates the obligation to watch and care for the elderly, but in some cases, the failure to maintain the human and material system itself is recognized. The basis for such judgment is whether the facility can predict the possibility of an accident and whether the facility has taken measures to prevent accidents. Also, the Japanese court recognizes the transfer of burden of proof in order to expedite the victims' rights. However, the liability of the facility for damages should not be so heavy that it would be hesitant to allow a person to enter the facility and make a contract.

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

A Study on the Evaluation the Safety of Evacuation in Indoor Sports Stadium through Evacuation Simulation (피난시뮬레이션을 통한 실내 스포츠경기장 내 장애인의 피난 안전성 평가 연구)

  • MinEon Ju;SeHong Min
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.69-81
    • /
    • 2024
  • Purpose: Recently, there has been a movement to guarantee the right to watch sports for the disabled. However, the sports stadium is designed without considering the wheelchair users, so the right to move in the stadium is not secured. Restrictions on the movement of the disabled make the evacuation vulnerable in an emergency. This study aims to develop a plan to ensure the safety of movement and evacuation of wheelchair users by conducting simulations targeting indoor sports stadiums. Method: The simulation was performed by constructing a scenario with the shape of the stands as a variable. The effect of the installation of wheelchair seats on evacuation was confirmed. Result: The results according to whether wheelchair seats are installed, the evacuation route of wheelchair movement, and whether wheelchair seats are separately arranged were compared. The impact of wheelchair seat installation on evacuation and its characteristics were derived. As a result, upward and separation seat was the most vulnerable to evacuation. Conclusion: A plan to secure evacuation performance was derived for the top floors of upward and separation seat. It is judged that the content can be use as a way to secure the safety of movement and evacuation of the disabled in sports stadiums.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Problems of Water Use and Estimation of Water Right in North Han River Shared by North and South Korea (II) - Estimation of Water Right in Downstream Area (남북공유하천 북한강의 물이용 문제점 및 수리권 추정 (II) -하류유역 수리권 추정)

  • Ahn, Jong-Seo;Lee, Gwang-Man;Jung, Kwan-Sue
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.4
    • /
    • pp.315-325
    • /
    • 2011
  • There are not many practical measures to solve a water conflict, when a hydromorphologically asymmetric situation in international rivers exists whereby downstream users may not affect upstream users but upstream users do cause downstream impacts. In taking advantage of this merit, North Korea has built Imnam Dam in upstream of North Han River and uses water for trans-basin hydropower generation. As an impact of this dam South Korean' area as a downstream user has been suffered from water deficit and dry river. It is very critical for South Korea to solve a key problem such as water allocation for water supply and river maintenance. Therefore, this study is aim to suggest alternatives for equitable water allocation in consideration of special circumstances between the South and the North. For this, reviewing the allocation methods of water rights is carried using lessons obtained from international river cases. The results show that the minimum desired streamflow is calculated at 7.3 $m^3/sec$; water budget analysis by the equitable distribution of streamflows at the border line of the North Han River, the difference in water supply deficiency is at 3.7 $m^3/sec$ before and after Imnam Dam; in the determined distribution method, the difference in water deficiency is at 11.38 $m^3/sec$. These results show that South Korea should be secured 11.38 $m^3/sec$ from North Korean's Imnam Dam in respective of water use right and sound river maintenance.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

The Antecedents of Switching Cost and its Effect on Customer Loyalty in Digital Music Service Industry (온라인 음악서비스 산업에서 전환비용의 선행요인 및 전환비용이 고객충성도에 미치는 영향)

  • Kang, Sung-Min;Uhm, Gi-Heon
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.157-180
    • /
    • 2010
  • Rapid development of information technology has generated a new industry and market. In particular, network technology such as the Internet and other computer networks made transaction activities switched from traditional offline commerce to e-commerce. Among them, digital content is bit-based object which is created and distributed through electronic environment. In particular, many entertainment contents such as the music, the movies, and the computer game softwares are main products. Although digital content commerce has high potential demand, it lacks the consideration about the factor related to maintaining existing customer such as customer loyalty and switching costs. There has been a number of research on customer loyalty and other factors affecting it in the traditional electronic commerce environment, but there is a lack of research which examines the characteristics of digital content. The study about the effect of switching costs on customer loyalty in digital content commerce is necessary because the customers of digital content commerce market are from those of other e-commerce market or traditional offline commerce market. In addition, customer loyalty and switching costs are important factors because they may build up greater customer retention. For that reason, this study focused on examining the relationships among switching costs, antecedents for switching costs, and customer loyalty in online digital music service industry. The study has three major purposes: (1) to find antecedents of switching costs on digital content commerce and examine effect of antecedents for switching costs; (2) to identify effect of switching costs on customer loyalty in digital content commerce and examine moderating effects of alternative attractiveness; (3) to identify the differences of antecedents for switching costs by contents transmission type(streaming service and downloading service). And, the online digital music service industry is selected in this study since there are many users and transactions incurring. To accomplish these purposes, a survey questionnaire was developed and distributed to 256 informants. Survey instrument was developed based on previous research and pre-established survey items. Total of 206 surveys are collected and used in the data analysis. Among the respondents, 56.8% is male and 43.2% is female. Also, 86 responses were streaming service user group and 120 responses were download service user group. These data was analyzed using regression analysis. Major findings of empirical analysis can be summarized as follows. First, switching costs have positive effect on customer loyalty in digital content commerce environment. Second, the influence of switching costs on customer loyalty increases under conditions of high alternative attractiveness. Third, DRM convenience and breadth of use have positive effect on switching costs. The findings imply that the digital content provider should pay more attention to switching costs in addition to customer satisfaction in order to attract customers. Also, increasing the convenience of DRM use by securing the convenience of user interface and expanding the support device and increasing the service use scope by providing diverse value-added service helps to create a switching barrier. The result of the study can become a practical use in marketing strategy for maintaining existing customer. In particular, switching barrier is very important under conditions of high competition in the online music service market. This study can be used as a basis for further studies about customer retention in digital content commerce.