• Title/Summary/Keyword: Information Access Rights

Search Result 185, Processing Time 0.032 seconds

A Study on the Prison Library for the Protection of Prisoner's and Pre-trial Prisoners' Rights (수용자의 기본권 보장을 위한 교정기관 도서관에 관한 연구)

  • Hong, Myung-Ja
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.4
    • /
    • pp.41-63
    • /
    • 2004
  • This study is an analysis of the prisoners' and the pre-trial prisoners' rights based on the laws and rules, and court cases. Rights included are the right to know and the access to information, the right to legal representation and the right of education, all of them can be protected when the prison libraries are administered In order to protect the prisoners' and pre-trial prisoners' rights, the necessity for the establishment of prison library is discussed and the direction of prison library system is suggested.

  • PDF

The Features of Restricted Access to Information at European and East Asian Libraries

  • Makhotina, Natalya;Pshenichnaya, Evgeniya
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.31-41
    • /
    • 2021
  • The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens' access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country's defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.

The Level of Patient Expectation and Governing Factors in Selecting Hospital (병원치료시 환자의 기대수준과 병원선택 요인 - 대학병원과 중소병원의 비교를 중심으로 -)

  • Hong, Yong-Sok;Park, So-Young
    • The Korean Journal of Health Service Management
    • /
    • v.5 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • This study assessed and compared the expectation levels of in- and out-patients at hospitals of different size in relation to patients' view of their rights. A survey of out-patients visiting university hospitals (204 patients) and small to mid size community hospitals (215 patients) in Seoul and Kyeongki Province was conducted, where the respondents reported their perceptions of patient rights. Based on the survey, their respective expectation levels for the medical services that they would receive was assessed and analyzed for exploring possible factors for their selecting small to mid sized hospitals over larger hospitals. The results showed difference in perceptions between patients visiting or staying in lager and smaller hospitals. Namely, for out-patients, those at university hospitals had higher perceptions only about their rights to privacy while in hospital, whereas in the case of in-patients, those at small to mid size hospitals had higher perceptions only about their rights to access to inspection information. With respect to the results from analysis of difference in the expectation level for medical services between university and non-university hospital patients, it was found that in-patients at university hospitals had higher perceptions about their rights to choose to see hospital visitors while in hospital and rights to access to religious facilities.

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

Security Improvement of File System Filter Driver in Windows Embedded OS

  • Seong, Yeon Sang;Cho, Chaeho;Jun, Young Pyo;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.17 no.4
    • /
    • pp.834-850
    • /
    • 2021
  • IT security companies have been releasing file system filter driver security solutions based on the whitelist, which are being used by several enterprises in the relevant industries. However, in February 2019, a whitelist vulnerability was discovered in Microsoft Edge browser, which allows malicious code to be executed unknown to users. If a hacker had inserted a program that executed malicious code into the whitelist, it would have resulted in considerable damage. File system filter driver security solutions based on the whitelist are discretionary access control (DAC) models. Hence, the whitelist is vulnerable because it only considers the target subject to be accessed, without taking into account the access rights of the file target object. In this study, we propose an industrial device security system for Windows to address this vulnerability, which improves the security of the security policy by determining not only the access rights of the subject but also those of the object through the application of the mandatory access control (MAC) policy in the Windows industrial operating system. The access control method does not base the security policy on the whitelist; instead, by investigating the setting of the security policy not only for the subject but also the object, we propose a method that provides improved stability, compared to the conventional whitelist method.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

Analysis of dCollection License System based on the Case Study of Digital Rights Management System for Open Access (오픈액세스를 위한 저작권관리시스템 사례 연구를 통한 dCollection 라이선스관리시스템 분석)

  • Park Mi-Sung
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.255-284
    • /
    • 2005
  • In this paper, we have made an analysis of dCollection license system and have presented the development subject based on various case study of digital rights Management( DRM ) under domestic and abroad Open Access circumstances. For this study, fist we made an investigation into the concept and the technical component of the copyright, license and DRM that act as obstacle to open access. It is hoped that the first study will be able to help people better understand the relationship between the related technique and Open Access System. Second we analyzed Creative Commons, RoMEO, Dspace system as abroad cases and Kyungpook National University's DRM system and Seoul National University's DRM system as domestic cases for copyright protection under open access circumstances. finally we will face up to the domestic open access reality and plan the future by presenting the development subject through dCollection license system analysis.

  • PDF

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.

A Study on the Revision of Copyright Limitations for Libraries in Copyright Law of Korea (저작권법상 도서관관련 권리제한의 개정안 연구)

  • Yoon, Hee-Yoon
    • Journal of Information Management
    • /
    • v.42 no.2
    • /
    • pp.1-21
    • /
    • 2011
  • The copyright law is the greatest legal tool for promoting access to knowledge and information by striking a balance between owners rights and users rights. For libraries, copyright limitations and exceptions are critical to meeting our missions to support learning and research, promote the flow of information, provide equitable access to information to the public, preserve intellectual and cultural heritage. Based on these reasons, this study analysed the limitation of copyright law of Korea for library, suggested improvement of reproduction for the library preservation and distribution including rental and lending, printout and transmission of internet information resources, copy of library materials which are rarely available through normal trade channel and government publications, reproduction and electronic transmission for persons with disabilities, and proposed fair use model(limitations on exclusive rights) for libraries.

An Architecture of Access Control Model for Preventing Illegal Information Leakage by Insider (내부자의 불법적 정보 유출 차단을 위한 접근통제 모델 설계)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-M.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.59-67
    • /
    • 2010
  • In the paper, we proposed an IM-ACM(Insider Misuse-Access Control Model) for preventing illegal information leakage by insider who exploits his legal rights in the ubiquitous computing environment. The IM-ACM can monitor whether insider uses data rightly using misuse monitor add to CA-TRBAC(Context Aware-Task Role Based Access Control) which permits access authorization according to user role, context role, task and entity's security attributes. It is difficult to prevent information leakage by insider because of access to legal rights, a wealth of knowledge about the system. The IM-ACM can prevent the information flow between objects which have the different security levels using context role and security attributes and prevent an insider misuse by misuse monitor which comparing an insider actual processing behavior to an insider possible work process pattern drawing on the current defined profile of insider's process.