• Title/Summary/Keyword: users' rights

Search Result 193, Processing Time 0.024 seconds

A Study on the Possibility of Assuring 'The Right to be Forgotten' Through the Digital Extinction Technology (디지털 소멸 기술을 통한 잊힐 권리의 보장 가능성 연구)

  • Joo, Moon-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.435-447
    • /
    • 2016
  • As data can be permanently stored and freely distributed, in modern society, the Internet became a world that remembers everything forever. Because of that, there has been increasing the number of accident with never-forgetting data and, as a result, a movement has been emerged to apply a notion of 'oblivion' to internet world. The movement is called 'The right to be forgotten.' However, 'The right to be forgotten' in a higher level which internet users want to be guaranteed is very limited in the juridical approach because of the confliction with the other basic rights and problems. On the other hand, the requests of individuals to guarantee 'The right to be forgotten' has been urged digital extinction technology, such as volatile SNS, Digital Aging System, to be developed. With introduction of oblivion, digital extinction technology with setting expire date on digital information can present a new solution on assuring 'The right to be forgotten.' This research establishes the detail scope of, analyzes the level of assurance of, and, through digital extinction technology with the established scope, suggest the potential assurance of the 'The right to be forgotten'.

A Study on Development of Patent Information Retrieval Using Textmining (텍스트 마이닝을 이용한 특허정보검색 개발에 관한 연구)

  • Go, Gwang-Su;Jung, Won-Kyo;Shin, Young-Geun;Park, Sang-Sung;Jang, Dong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3677-3688
    • /
    • 2011
  • The patent information retrieval system can serve a variety of purposes. In general, the patent information is retrieved using limited key words. To identify earlier technology and priority rights repeated effort is needed. This study proposes a method of content-based retrieval using text mining. Using the proposed algorithm, each of the documents is invested with characteristic value. The characteristic values are used to compare similarities between query documents and database documents. Text analysis is composed of 3 steps: stop-word, keyword analysis and weighted value calculation. In the test results, the general retrieval and the proposed algorithm were compared by using accuracy measurements. As the study arranges the result documents as similarities of the query documents, the surfer can improve the efficiency by reviewing the similar documents first. Also because of being able to input the full-text of patent documents, the users unacquainted with surfing can use it easily and quickly. It can reduce the amount of displayed missing data through the use of content based retrieval instead of keyword based retrieval for extending the scope of the search.

Designing the Promotion Policy of Korea ESCO Industry through the Examination of Foreign Country Exercises (해외사례 조사를 통한 국내 ESCO 산업 활성화 방안)

  • Min, Eunju;Kim, Myeongrok;Nam, Kitae;Kang, Mingoo;Kim, Suduk
    • Environmental and Resource Economics Review
    • /
    • v.26 no.1
    • /
    • pp.103-121
    • /
    • 2017
  • The domestic ESCO project was introduced in 1992 as one of the energy efficiency improvement programs. In recent energy market, the changes in the market conditions such as smart grid, renewable energy, and the importance of demand response became important issues. As the diversified business models are required, examples of overseas exercises are examined. Business areas in Europe or the US where the ESCO industry has been active include measures to improve the efficiency of energy facilities in all areas, ranging from energy supply facilities and energy services to end users. This type of ESCO overseas business model can be classified into various types such as project execution method, supplier demand management, financing method, climate change and emission rights, new and renewable energy, and other criteria. In this study, we propose to adopt IEC (Integrated Energy Contracting) contract method in domestic ESCO market for additional business models. Current convention of listing the specific individual business types being allowed by regulation turned out to be obstacles to the revitalization of the related market. In order to achieve the goal of energy conservation, it is recommended, instead, to revise the current funding guidelines to be a negative system.

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

A Study for Database of Uibang Yuchui (醫方類聚) and Its Value as the Intellectual Property of Traditional Korean Medical Knowledge (지식재산으로서의 의방유취의 가치와 DB구축의 필요성에 관한 소고)

  • Ahn, Sang-Woo;Han, Jiwon;Park, Joo-Young;Cha, Wung-Seok
    • The Journal of Korean Medical History
    • /
    • v.31 no.1
    • /
    • pp.123-134
    • /
    • 2018
  • Today, knowledge itself has become a resource which must be protected by the pertinent community of its contributors and users, from being manipulated or distorted by third-party players. The preservation of knowledge in relationship to the cultural context of its origins, has been recognized by international organizations intent on maintaining authentic voice and perspective. Globally, the WIPO (World Intellectual Property Organization) organizes the annual IGC (Intergovernmental Committee) meeting to address various issues associated with each country's utilization of intellectual and bio source property. Korean Medicine is the official name for the traditional medicine that has been inherited from the cultures of the Korean Peninsula. It is one of the four practices of East Asian Medicine including Traditional Chinese Medicine (TCM) from China, Kampo Medicine of Japan, and Sino-Vietnamese Medicine in Vietnam. As a cultural treasure representing centuries of evolving knowledge, Korean Medicine is protected under intellectual property rights afforded by WIPO, and must be understood in relationship to, and distinct from, TCM. It is understood that China has a strong political purpose to claim all the traditional medicines of the East Asian region under the name of TCM, including Korean Medicine. In fact TCM was authorized as the representative name for all East Asian medicine by decisions made by the ISO (International Standard Organization) in 2015. This paper proposes a pilot study on how to protect the intellectual property of Korean Medicine from efforts by China to claim it under the umbrella of TCM. Using the Uibang Yuchui (醫方類聚, Classified Collection of Medical Formulas) this paper suggests establishing a Database of UBYC, which was published in 1477 by the Joseon Korea government. UBYC was the reorganized version of contemporary East Asian medical sources, and has already hundreds of year's rich indigenous and culturally specific medical history of Korea, from which Korean Medicine has been built.

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

Survey and Analysis of the Audio Description Acceptance for Improving the Media Accessibility of the Visually Impaired (시각장애인 미디어접근권 향상을 위한 해설오디오 수용도 조사 및 분석)

  • Jang, Inseon;Ahn, ChungHyun;Seo, Jeongil;Lee, Eun Ha;Kang, Wan Sic
    • Journal of Broadcast Engineering
    • /
    • v.22 no.2
    • /
    • pp.214-233
    • /
    • 2017
  • For people with physical or sensory limitations, broadcasting is the main means of information acquisition and leisure. Recently, changes in the media environment, such as convergence of broadcasting and communication, digital mobile conversion of broadcasting, and active media usage behavior of users, make broadcasting accessibility of the disabled difficult, and as a result, the information gap between the disabled and the non-disabled is increasing. A notice on broadcasting rights for the disabled was enacted in consequence of the amendment of the Broadcasting Law in July 2011 and the web accessibility guideline became more effective with the amendment of the National Informatization Act in 2013 so that legal basis for the right of media access for the disabled was established. However, media services for them are still lacking quantitatively and qualitatively. In this study, we describe the present status of the audio description service for the visually impaired, and analyze the results of the questionnaire survey on the usage status, satisfaction and improvement requirements of the audio description service for 100 visually impaired people.

Limitations and Challenges of Game Regulatory Law and Policy in Korea (현행 게임규제정책의 한계와 과제 : 합리적인 규제를 위한 고려사항)

  • Kwon, Hun-Yeong
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.149-164
    • /
    • 2014
  • The laws and policies governing Korea's game regulations are becoming more and more topics for debate as we enter the Age of Internet. The nature of the basis for Internet regulations and policies are not rooted in freedom of speech or fundamental values of democracy, but rather focused on solving real-world problems such as protection of the youth. Furthermore, the reality is that regulatory devices for keeping the social order such as regulating gambling are being applied directly to games without consideration on the characteristics of Internet gaming, raising concerns that the expansion of constitutional values and innovative empowerment inherent to the Internet are being weakened. The Geun-Hye Park Administration which succeeded Myung-Bak Lee's Administration, even went so far as to implement the so-called "Shutdown Policy", which prohibits access to Internet games during pre-defined time zones and also instigated a time zone selection rule. In order to curb the gambling nature of Internet games, government-led policies such as the mandatory personal identification and prohibition of player selection or in other words mandatory random player selection are being implemented. These institutions can inhibit freedom of speech, which is the basis of democracy, violate the right of equality through unreasonable discrimination between domestic and foreign service providers, and infringe upon the principles of administrative law, such as laws, due process in policies, and balance in among policies and governmental bodies. Going forward, if Korea's Internet game regulations and polices is to develop in a rational manner, regulatory frameworks will need to be designed to protect the nature of the Internet and its innovative values that enable the realization of constitutional values; for example, the Internet acting as the "catalytic media for freedom of expression as a fundamental human right ", which has already been acknowledged by the Korea's Constitutional Court. At the same time, transparent procedures should be put into place that will allow diverse participation of stakeholders including game service providers, game users, the youth and parents in the legislation and enforcement process of regulatory institutions; policies will also need to be transformed to enable not only regulatory laws but also self-regulation system to be established. And in this process, scientific and empirical analysis on the expected effects before introducing regulations and the results of enforcing regulations after being introduced will need to be strengthened.

An Investigative Study of the Awareness of Person in Charge on the Improvement of Extended Support Project Operation for the Public Libraries' Opening Hours (공공도서관 개관시간 연장지원 사업 운영 개선에 대한 담당자 인식조사 연구)

  • Noh, Younghee;Kim, Dongseok;Kwak, Woojung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.1
    • /
    • pp.115-143
    • /
    • 2020
  • This study conducted a survey on the current status and satisfaction of libraries participating in the opening hours support project in order to continue it to meet the purpose of improving information access and life welfare. To this end, a questionnaire and interview survey were conducted for those in charge of opening hours for each library, and the results are as follows. First, the opening hours support project is a project that needs a strategy that fits the characteristics of the region and the environment. Therefore, it is necessary to consider operating independently rather than relying on national support in the future through the preparation of regional-oriented operation plans. Second, it is necessary to establish a flexible operating model for opening hours that both employees and users can understand. Third, it is necessary to prepare an organizational operation plan that requires both duties and responsibilities along with the rights equivalent to existing regular employees. Fourth, in order for national public libraries in Korea to develop and implement a consistent policy for specific policies and projects, it is necessary to unify the separate public library operating system in the future. Fifth, it is necessary to prepare education and guidelines for the continuity and stable operation of the project, and to activate services other than labor costs, such as support for improving the space for the user's pleasant use.

MPEG-21 Terminal (MPEG-21 터미널)

  • 손유미;박성준;김문철;김종남;박근수
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.410-426
    • /
    • 2003
  • MPEG-21 defines a digital item as an atomic unit lot creation, delivery and consumption in order to provide an integrated multimedia framework in networked environments. It is expected that MPEG-21 standardization makes it Possible for users to universally access user's preferred contents in their own way they want. In order to achieve this goal, MPEG-21 has standardized the specifications for the Digital Item Declaration (DID). Digital Identification (DII), Rights Expression Language (REL), Right Data Dictionary (RDD) and Digital Item Adaptation (DIA), and is standardizing the specifications for the Digital Item Processing (DIP), Persistent Association Technology (PAT) and Intellectual Property Management and Protection (IPMP) tot transparent and secured usage of multimedia. In this paper, we design an MPEG-21 terminal architecture based one the MPEG-21 standard with DID, DIA and DIP, and implement with the MPEG-21 terminal. We make a video summarization service scenario in order to validate ow proposed MPEG-21 terminal for the feasibility to of DID, DIA and DIP. Then we present a series of experimental results that digital items are processed as a specific form after adaptation fit for the characteristics of MPEG-21 terminal and are consumed with interoperability based on a PC and a PDA platform. It is believed that this paper has n important significance in the sense that we, for the first time, implement an MPEG-21 terminal which allows for a video summarization service application in an interoperable way for digital item adaptation and processing nth experimental results.