• 제목/요약/키워드: users' rights

검색결과 193건 처리시간 0.023초

프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구 (A Study on the Criminal Threat and Privacy Protection with a Proxy Service)

  • 강신범;이상진;임종인
    • 정보보호학회논문지
    • /
    • 제22권2호
    • /
    • pp.317-326
    • /
    • 2012
  • 인터넷 사용자와 정보서비스 제공자 사이의 권리 침해 행위의 예방을 위해 행위자들의 본인확인제와 활동에 사용된 개인정보의 수집이 이뤄지고 있다. 하지만 인터넷 사용상의 익명성 보장을 요구하는 개인들의 권리와 규제 법률의 집행 사이의 논쟁은 지속되고 있다. 다양한 기술적 목적으로 사용되는 프록시 서버(Proxy Server)의 특성을 이용해 인터넷 상의 익명성을 확보하려는 우회접속 사용자가 늘어나고 있지만 이에 대한 제도적 관리체계나 사용자들을 보호할 제도적 장치는 미미하다. 본 연구에서는 프록시 서버를 이용한 우회접속 서비스가 갖는 사이버범죄 위협과 프라이버시 보호를 위한 필요성에 대해 논하고 비례성 고찰을 통해 공익과 제한되는 개인의 권익 사이에 균형을 위해 필요한 제도적 보완책을 제안한다.

A Study on the Perception of Personal Mobility Vehicle for the Improvement of Pedestrian Environment for the Disabled

  • Lee, Joohyung;Lee, Kyooil
    • Physical Therapy Rehabilitation Science
    • /
    • 제10권2호
    • /
    • pp.124-133
    • /
    • 2021
  • Objective: In order to secure the right to walk for the weak, such as the disabled, this study aims to suggest ways to improve the pedestrian environment by identifying factors that cause obstacles to walking. Design: Data Analysis and Perception Survey. Methods: The questionnaire was conducted separately between users of personal mobility vehicle and non-users. A total of 207 effective questionnaires were collected, and the analysis analyzed the perception of personal mobility vehicle by conducting frequency analysis using SAS 9.4. The survey focused on basic information on respondents, walking conditions, understanding of personal mobility vehicle, awareness of pedestrian space passage and parking, and awareness of the possibility of securing pedestrian rights due to new regulations. Results: First, when moving a pedestrian path by personal mobility vehicle, it shall be limited to less than the walking speed of pedestrians. Second, the parking location of the personal mobility vehicle is located at the boundary of the pedestrian road and the lane. Third, pay a fair price to park in a pedestrian space. Conclusions: It is necessary to improve the system to strengthen the contents of education to take into account the safety of pedestrians in education on how to use personal mobility vehicle.

Exploring Considerations for Developing Metaverse Ethical Guidelines

  • HoSung WOO;Yong KIM
    • 연구윤리
    • /
    • 제4권2호
    • /
    • pp.1-5
    • /
    • 2023
  • Purpose: There are already hundreds of millions of users of the Metaverse platform, and within a few years, it is expected to develop into a stage for new economic activities with huge industrial ripple effects due to the size of users. The purpose of this study is to derive considerations for the development of metaverse ethical guidelines. Research design, data, and methodology: The concept of the metaverse was examined through various opinions of industry and experts on the metaverse, and literature related to metaverse ethics was analyzed in the Korean journal database. Results: Six issues were identified through the existing research. (1) Establishing a unified definition of metaverse (2) Necessity of establishing ethical principles considering the operator (3) Personal information protection and privacy (4) Expression in a virtual environment (5) Copyright and intellectual property rights of creations (6) Virtual economy and fairness of trade. Conclusions: Metaverse ethics will be developed and implemented in a form and method different from the real world, but basically, continuous discussions on ethical rationality are needed in the process. In addition, since the ethical judgment in the metaverse environment accompanies cultural differences and epochal changes, it is necessary to focus on metaverse ethics cases.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

Music License in the Metaverse

  • Kyungsuk Kim
    • International journal of advanced smart convergence
    • /
    • 제12권4호
    • /
    • pp.44-54
    • /
    • 2023
  • This paper provides a comprehensive analysis of the implications of the metaverse on the music industry, focusing on copyright issues and potential solutions. It delves into the concept and characteristics of metaverse platforms, describing them as environments that immerse users in a variety of virtual experiences. A significant portion of the paper is dedicated to exploring music use and copyright infringement in the metaverse. It examines how users incorporate existing music into their content, often leading to legal challenges due to copyright infringement. The paper discusses the role of online service providers (OSPs) in this context and the legal implications of their actions. The paper also addresses the 'safe harbor' provisions for OSPs and examines the balance between protecting rights holders and limiting OSP liability. It highlights the challenges and limitations of copyright enforcement in the metaverse, especially given the unique nature of content on platforms such as Roblox. Finally, the article proposes solutions to simplify music licensing in the metaverse, suggesting a shift from property rules to liability rules and the establishment of Collective Management Organizations (CMOs) to streamline the licensing process and better protect copyright holders' interests.

Web 3.0 Business Model Canvas of Metaverse Gaming Platform, The Sandbox

  • Song, Minzheong
    • International journal of advanced smart convergence
    • /
    • 제13권2호
    • /
    • pp.119-129
    • /
    • 2024
  • We look at Web 3.0 business model canvas (BMC) of metaverse gaming platform, The Sandbox (TS). As results, the decentralized, blockchain-based platform, TS benefits its creators and players by providing true ownership, tradability of decentralized assets, and interoperability. First, in terms of the governance and ownership, The SAND functions a governance token allowing holders to participate in decision and SAND owners can vote themselves or delegate voting rights to other players of their choice. Second, in terms of decentralized assets and activities, TS offers three products as assets like Vox Edit as a 3D tool for voxel ASSETS, Marketplace as NFT market, and Game Maker as a visual scripting toolbox. The ASSETS made in Vox Edit, sold on the Marketplace, can be also utilized with Game Maker. Third, in terms of the network technology, in-game items are no longer be confined to a narrow ecosystem. The ASSETS on the InterPlanetary File System (IPFS) are not changed without the owner's permission. LAND and SAND are supported on Polygon, so that users interact with their tokens in a single place. Last, in terms of the token economics, users can acquire in-game assets, upload these assets to the marketplace, use for paying transaction fees, and use these as governance token for supporting the foundation.

저작권법에 준한 도서관봉사에 관한 연구 -미국과 한국의 저자재산권의 제한규정을 중시으로- (Limitations on Exclusive Rights of Authors for Library Reprography : A Comparative Examination of the Draft Revision of Korean Copyright Law with the New American Copyright Act of 1976)

  • 김향신
    • 한국도서관정보학회지
    • /
    • 제11권
    • /
    • pp.69-99
    • /
    • 1984
  • A dramatic development in the new technology of copying materials has presented us with massive problems on reconciling the conflicts between copyright owners and potential users of copyrighted materials. The adaptation to this changing condition led some countries to revise their copyright laws such as in the U. S. in 1976 and in Korea in 1984 for merging with the international or universal copyright conventions in the future. Copyright defined as exclusive rights given to copyright owners aims to secure a fair return for an author's creative labor and to stimulate artistic creativity for the general public good. The exclusive rights on copyrightable matters, generally for reproduction, preparation of derivative works, public distribution, public performance, and public display, are limited by fair use for scholarship and criticism and by library reproduction for its preservation and interlibrary loan. These limitations on the exclusive rights are concerned with all aspects of library services and cause a great burden on librarian's daily duty to provide balance between the rights of creators and the needs of library patrons. The fair use as one of the limitations on it has been coupled with enormous growth of a new technology and extended from xerography to online database systems. The implementation of the fair use and library reprography in Korean law to the local practices is examined on the basis of the new American copyright act of 1976. Under the draft revision of Korean law, librarians will face many potential problems as summarized below. 1. Because the new provision of 'life time plus 50 years' will tie up substantial bodies of material longer than the old law, until that date librarians would need permissions from the owners and should pay attention to the author's death date. 2. Because the copyright can be sold, distributed, given to the heirs, donated, as a whole or a part, librarians should chase down the heirs and other second owners. In case of a derivative work, this is a real problem. 3. Since a work has its protection from the moment of its creation, the coverage of copyrightable matter would be extended to the published or the unpublished works and librarian's work load would be heavier. Without copyright registration, no one can be certain that a work is in the public domain. Therefore, librarians will need to check with an authority. 4. For implementation of limitations on exclusive rights, fair use and library reproduction for interlibrary loan, there can be no substantial aggregate use and there can be no systematic distribution of multicopies. Therefore, librarians should not substitute reproductions for subscriptions or purchases. 5. For the interlibrary loan by photocopying, librarians should understand the procedure of royalty payment. 6. Compulsory licenses should be understood by librarians. 7. Because the draft revision of Korean law is a reciprocal treaty, librarians should take care of other countries' copyright law to protect foreign authors from Korean law. In order to solve the above problems, some suggestions are presented below. 1. That copyright clearinghouse or central agency as a centralized royalty payment mechanism be established. 2. That the Korean Library Association establish a committee on copyright. 3. That the Korean Library Association propose guidelines for each occasion, e.g. for interlibrary loan, books and periodicals and music, etc. 4. That the Korean government establish a copyright office or an official organization for copyright control other than the copyright committee already organized by the government. 5. That the Korean Library Association establish educational programs on copyright for librarians through seminars or articles written in its magazines. 6. That individual libraries provide librarian's copyright kits. 7. That school libraries distribute subject bibliographies on copyright law to teachers. However, librarians should keep in mind that limitations on exclusive rights are not for an exemption from library reprography but as a convenient access to library resources.

  • PDF

그리드 서비스를 위한 사용자 데이터 관리 시스템 설계 (Design of User Data Management System for Grid Service)

  • 오영주;김법균;안동언;정성종
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.224-226
    • /
    • 2005
  • Grid computing enables the fundamental computing shift from a localized resource computing model to a fully-distributed virtual organization with shared resources. In the grid computing environment, grid users usually get access rights by mapping their credential to local account. The mapped total account is temporally belongs to grid user. So, data on the secondary storage, which is produced by grid operation, can increase the load of system administration or can issue grid user's privacy. In this paper, we design a data management system for grid user to cover these problems. This system implements template account mechanism and manages local grid data.

  • PDF

웹 환경에서 SPKI 인증서를 이용한 접근 제어 (An Access Control using SPKI Certificate in Web Environment)

  • 김점구
    • 융합보안논문지
    • /
    • 제6권4호
    • /
    • pp.11-19
    • /
    • 2006
  • 웹 서비스는 모든 사용자에 대해 동등한 접근 권한을 부여하여 서로의 자원을 공유할 수 있도록 하고 있다. 이러한 상황에서는 인터넷을 통한 다양한 공격에 따른 취약성이 예상되므로 본 논문에서는 자원 공유를 위해 연결을 요청하는 사용자들에게 "SPKI (Simple Public Infrastructure) 인증서"를 발행하여 접근 권한을 지정하고, 정보 요청자는 자신에게 주어진 접근 권한에 따라 제한적으로 정보 제공자의 자원을 사용할 수 있는 방안을 제안한다.

  • PDF

모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호 (Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device)

  • 권구락;김영로
    • 디지털산업정보학회논문지
    • /
    • 제4권1호
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.