• Title/Summary/Keyword: users' rights

Search Result 193, Processing Time 0.026 seconds

Wavelet based Watermarking Technique for the Digital Contents Protection (지적재산권 보호를 위한 웨이블릿 기반 워터마킹 기술)

  • 송학현;김윤호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.912-917
    • /
    • 2004
  • The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyber-space. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we propose a wavelet based watermarking method which is used for implementing in the frequency domain.

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

Implementation of the Access Control System for Hangul Document System (한글 문서 접근 제어시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.323-329
    • /
    • 2018
  • In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system. The system structure designed in this paper is to transform header information of Hangul document by analyzing the structure of Hangul document. By modifying the function of a specific field of the header information in Hangul document, it prevents users that do not have data for the modified information to open and view the document. By controlling the access rights to important Hangul documents, it is possible to manage Hangul files more safely. In this paper, the actual design of information was implemented and experiments were carried out. Results of the experiment confirmed that the access control system is operated in normal way. In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system.

A Study of PICS/RDF-Based Internet Content Rating System: Issues Related to Freedom of Expression (PICS/RDF 기반 인터넷 내용 등급 시스템 연구: 표현의 자유를 중심으로)

  • Kim, You-Seung
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.3
    • /
    • pp.271-297
    • /
    • 2007
  • Since the use of the Internet has proliferated, the availability of illegal and harmful content has been a great concern to both governments and Internet users. Among various solutions for issues related to such content, Internet content filtering technologies have been developed for enabling users to deal with harmful content. In recent years, commercial filtering has become massively popular. Many parents, teachers and even governments have chosen commercial filtering software as a feasible technical solution for protecting minors from harmful information on the Internet. The Internet content filtering software market has grown significantly. However, Internet content filtering software has led to intense debate among civil liberties groups, They deem this to be censorship and argue that Internet filtering technologies are simply unworkable because they have inherent weaknesses. They are critical of the fact that most filtering has violated free speech rights and will eventually wipe out honor and controversial, yet innocent incidences of free speech on the Internet. In this article Internet content filtering, in particular PICS/RDF-based label filtering, so-called Internet content rating system, will be explored and its advantages and drawbacks relating to end-users' autonomy and freedom of expression will be discussed.

Consumer Impairment and Its Improvement on Longterm Care Insurance Service : Focused on the Current Conditions and the Analysis of Counseling Cases in Korea and Japan (노인장기요양보험 서비스에 관한 소비자피해와 개선방안 : 한일 서비스이용현황 및 상담사례 분석을 중심으로)

  • Lee, Hyun-Jin
    • Journal of Families and Better Life
    • /
    • v.28 no.1
    • /
    • pp.51-67
    • /
    • 2010
  • This study looked into the current conditions in Korean and Japanese care management for the elderly, cases of consumer counseling in these countries, and the supporting institutions for Japanese users regarding the use of care management for the elderly. The number of recipients of care management for the elderly in both Korea and Japan is growing every year, and more Japanese users receive various services compared to Korean users. The results of an analysis on consumer counseling regarding the use of Korean and Japanese care management revealed, two types of complaints: counseling for the improvement of the institution and complaints related to the procurement of service. Regarding the insurance system, the complaints were mostly related to affirmation of a rating and the burden incurred by cost-sharing. Regarding the use of service, such key impairment cases were related to in-service medical accidents, illegal acts including caregiver contract violations and forced retirement, careless service by workers, and human rights violations of the elderly. Japan has developed governmental and, related-administrative and business services as well as a local governmental system to redress customer impairment issues as this pertains to service for better quality care management. In addition, they have enlarged the locally closed service, provided exact information about the services offered, and improved service appraisal techniques. The Japanese cases will serve as a good reference to improve the Korean system. In particular, the construction of a system that reduces customer losses and the availability of more counseling information are urgently required to improve the system in terms of customer experiences when they seek care management.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

A Study on Access Control Technique for Provision of Cloud Service in SSO-based Environment

  • Eun-Gyeom Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.73-80
    • /
    • 2023
  • In this paper, a technology to protect important information from access in order to revitalize the cloud service market. A technology is proposed to solve the risk of leakage of important confidential and personal information stored in cloud systems, which is one of the various obstacles to the cloud service market. To protect important information, access control rights to cloud resources are granted to cloud service providers and general users. The system administrator has superuser authority to maintain and manage the system. Client computing services are managed by an external cloud service provider, and information is also stored in an external system. To protect important in-house information within the company, all users, it was designed to provide access authority with users including cloud service providers, only after they are authenticated. It is expected that the confidentiality of cloud computing resources and service reliability achieved through the proposed access control technology will contribute to revitalizing the cloud service market.

Design of the Function for User Program Execution Control in the Windows Environments (윈도우 환경에서 사용자 프로그램 실행 권한 제어 기능 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1553-1560
    • /
    • 2016
  • In this paper, we design a program that controls the execution permissions for the running application in the Windows system environment. It does not allow general users to execute the program converting the specific location information of the execution program, to any of the bit values with the formal structure information in window program. The converted bit value can be returned to the original bit value in the case of an authorized user, so that the original program can be normally performed. By doing so, it can be more safely used in the risk of reverse engineering for Windows executable program. We implemented the control program for the program execution authority we proposed in this paper, and the experiment was performed. At the results of experiments, it was confirmed that the control function to permit execution for the user program was working properly in the Windows environment.

A Study on the Improvement of Agricultural Facility Legislation (농업용 시설의 건축 및 이용 법령 개선연구)

  • Lee, Won;Jang, Woo-Suk;Kwon, Hyung-Dun;Song, Jae-Il;Kim, Ji-Suk;Jung, Nam-Su
    • Journal of Korean Society of Rural Planning
    • /
    • v.19 no.4
    • /
    • pp.73-79
    • /
    • 2013
  • As facilities performing the production, processing, preservation, and shipment of agricultural products; agricultural facilities are categorized into planting facilities and livestock facilities based on the management target. Agricultural facilities are set in farmlands, and facility users mainly complain about the legal or institutional restrictions on farm rather than their own facilities itself. From 2009 to 2012, the Ministry of Agriculture Food and Rural Affairs (MAFRA) published the "Casebook of farmer Complaints on Farmlands" in order to help answer farmers' questions and support public workers' workloads. However, contents related to agricultural facility installed in farmland are currently not dealt with in particular. Among agricultural facilities, demands of property rights with livestock facilities have risen due to construction permissions, operational restrictions, and high initial investment costs; and relevant laws were revised and are now being executed. However, for planting facilities such as mushroom facilities, ginseng facilities, and greenhouses; farmer complaints related to property rights are constantly increasing because revisions to relevant laws are not being made despite the rising diversity of construction materials through technical developments as well as the rising scale of assets-i.e. mechanization, automation, and the application of New Regeneration Energies according to capital influx. In this study, the current state of relevant agricultural facility legislation were organized and their drawbacks deduced in order to propose improvements of Agricultural Facility Legislation. The result of interviewing with public workers and farmers show that agricultural facilities should be regarded as extensions of farmlands rather than as facilities built in land where development actions were being taken. Alternatives able to reflect these opinions were suggested through expert consultation.

A Study on the Reasonable Choice and Utilization of Incoterms 2020 Rules from the Perspective of Logistics and Supply Chain Management

  • Yang, Jung-Ho
    • Journal of Korea Trade
    • /
    • v.25 no.1
    • /
    • pp.152-168
    • /
    • 2021
  • Purpose - This paper has an objective to suggest reasonable criteria in choosing Incoterms 2020 rules for efficient and effective logistics management in that the Incoterms rules affect not only the rights and obligations of the parties to the sales contract but also the control and management of logistics system and transaction costs in the transaction. Design/methodology - An analysis of the various factors is needed to assess the positive or negative impact on global value chain in choosing Incoterms rules from a total logistics view. This study analyzes the impact of which the content of individual incoterms rules can have on the operation of international logistics systems under the global value chain from a strategic perspective to suggest reasonable criteria for selection of Incoterms rules depending on the transaction situation. Findings - Results of this study shows that consideration of various aspects which includes the characteristics of the products, logistics capabilities, infrastructure, transaction volume, operational cost, customs regulations, tax and accounting should be reflected in choosing the appropriate Incoterms rules. Therefore, in order to minimize the total cost and improve logistics performance, it may be helpful to develop a decision support model which allows users to select appropriate Incoterms rules based on various influencing factors. Originality/value - This Study is different from previous research which has mainly focused on the rights and obligations of the parties to the transaction regarding the transfer of risks and costs under the Incoterms. In addition, this study has significance in that it provides implications for export and import companies that can be able to use Incoterms as a strategic tool to efficiently manage the global value chain and improve supply chain performance.