http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
한국에서 사물인터넷과 관련한 빅데이터 보호제도의 현재와 그 방향 ― 사물인터넷의 특성과 부정경쟁방지 및 영업비밀보호에 관한 법률에 의한 보호의 충분성에 중점을 두고
설민수 ( Seul¸ Minsoo ) 한국지식재산연구원 2020 지식재산연구 Vol.15 No.4
빅데이터의 보호는 사물인터넷이 활성화와 함께 일반인의 관심을 모으고 있는 영역이다. 자연스럽게 기존 보호제도의 문제점을 지적하면서 새로운 지식재산권에 의한 보호주장들이 분출되고 있다. 하지만 사물인터넷 관련 빅데이터는 다른 빅데이터와는 사물인터넷 기술의 특성에 따라 보안조치에 의한 비공지성, 추적가능성에 바탕을 둔 사용자의 개인정보와의 불가분성 등 여러 가지 다른 특징을 가지고 있고, 이러한 특성을 무시한 새로운 지식재산권에 의한 보호는 그 소유권 귀속과 같이 해결하기 어려운 여러 가지 법률적 쟁점을 야기할 뿐이다. 반면, 비공지성을 갖춘 정보를 보호하는 한국의 부정경쟁방지 및 영업비밀보호에 관한 법률과 그 보호범위에 관한 법원의 해석은 다른 국가와 다르게 영업비밀, 영업상 주요자산, 제2조 제1호 ㈘목의 부정경쟁행위라는 틀을 통해 이를 다양하게 분류해 보호하고 있다. 또한 그 정보의 독점력이 가진 가치에 따라 다양한 범위의 형사적 제재 및 민사적 보호를 폭넓게 제공하고 있다. 이에 따라 사물인터넷 관련 빅데이터 중 그 가치를 달리하는 사전처리를 거친 데이터세트, 비식별화 조치를 거친 데이터세트, 원시데이터 상태의 빅데이터에 관해서도 충분한 보호를 제공하며 사물인터넷 관련 빅데이터 거래에 있어 중요한 장애물인 개인정보 보호에 관련하여 재식별을 막아 빅데이터 거래 활성화를 가능하게 하는 장점도 가지고 있다. Protection of Big Data draws attention of general public beyond related experts as Internet of Things(hereafter ‘IoT’) spreads. Naturally, discussions of introduction of new intellectual property protection measures that points out the fault of existing protections are erupting. However, IoT related Big Data has many distinct features from other Big Data including non-publicity originated from security measures, inseparability of user’s personal information by traceability. Accordingly, new protection measures by intellectual property to IoT related Big Data bring out unsolvable numerous legal issues like attribution of ownership. The Unfair Competition Prevention and Trade Secret Protection Act and court’s interpretation(hereafter ‘the Act’) protects non-public information in Korea by utilizing frames of trade secret, major assets in business and unfair competitory acts by section 2.1(Ka) unlike other countries. The Act provides various and wide range of criminal sanctions and civil protection measures according to the value of the information by monopoly powers. It sufficiently protects pre-processed dataset, de-identified dataset, Big Data in raw data status among IoT related Big Data and has the advantage of helping active trading of Big Data by discouraging re-identification of personal information which is one of main barriers to trading of IoT related Big Data.
Minsoo Ko(Minsoo Ko),Su-hyuk Chi(Su-hyuk Chi),Jong-ha Lee(Jong-ha Lee),Sang-il Suh(Sang-il Suh),Moon-Soo Lee(Moon-Soo Lee) 대한정신약물학회 2023 CLINICAL PSYCHOPHARMACOLOGY AND NEUROSCIENCE Vol.21 No.2
Objective: Cyber addiction, which is more vulnerable in adolescents, is defined as the excessive use of computers and the Internet that causes serious psychological, social, and physical problems. In this study, we investigated the resting-state functional connectivity (rsFC) in adolescents with cyber addiction. Methods: We collected and analyzed resting-state functional neuroimaging data of 20 patients with cyber addiction, aged 13−18 years, and 27 healthy controls. Based on previous studies, the seed regions included the dorsolateral prefrontal cortex, medial orbitofrontal cortex, lateral orbitofrontal cortex, dorsal anterior cingulate cortex, insula, hippocampus, amygdala, nucleus accumbens, and the ventral tegmental area. Seed-to-voxel analyses were performed to investigate the differences between patients and healthy controls. A correlation analysis between rsFC and cyber addiction severity was also performed. Results: Patients with cyber addiction showed the following characteristics: increased positive rsFC between the left insular−right middle temporal gyrus; increased positive rsFC between the right hippocampus−right precentral gyrus; increased positive rsFC between the right amygdala−right precentral gyrus and right parietal operculum cortex; increased negative rsFC between the left nucleus accumbens−right cerebellum crus II and right cerebellum VI. Conclusion: Adolescents with cyber addiction show altered functional connectivity during the resting state. The findings of this study may help us better understand the neuropathology of cyber addiction in adolescents.
MinSoo Kim-Bossard The Pacific Early Childhood Education Research Ass 2022 Asia-Pacific journal of research in early childhoo Vol.16 No.2
In an ethnographic interview study, I examine the role that the English language plays in the lives of Filipina immigrants in South Korea as they navigate their new home as mothers of young children using the following research question: What impact does Filipina immigrant mothers’ knowledge of the English language have on their mothering experiences and the ways they navigate local communities in Korea? I examine how Filipina mothers use English as a means of communication with their children, as an asset to pursue employment opportunities, and as a channel through which they establish relationships in Korean society, which has a multi-billion US dollar market for English language education. While language skills are often promoted as a solution for difficulties immigrant mothers face during their time of transition, Filipina immigrant mothers’ language skills, their English in particular, help us understand the complexities of relational power dynamics within their homes, workplaces, and local communities.
Minsoo Sung,Yo Han Jung,Kyung-Yul Lee 대한신경초음파학회 2023 대한신경초음파학회지 (JNN) Vol.15 No.1
Screening for lower extremity peripheral arterial disease (PAD) is essential in assessing a patient’s risk of cerebrovascular disorders. The ankle-brachial index (ABI) is widely used as a screening tool for PAD, but it can produce falsely normalized results due to factors like artery calcification and collateral vessels. We report a patient with normal ABI but confirmed lower extremity PAD through ultrasound and computed tomography (CT). This case shows the limitation of ABI for PAD diagnosis. Additional tests, such as CT or ultrasound, should be considered when PAD is suspected, even if the ABI is normal.
A PRIVACY MODEL IN UBIQUITOUS ENVIRONMENTS
Minsoo Kang,Hee-Cheol Kim 한국멀티미디어학회 2006 한국멀티미디어학회 국제학술대회 Vol.2006 No.-
In the era of ubiquitous computing, various databases contain a lot of personal information to be shared publicly with others. While it implies much convenience for our daily lives, it also damages privacy. As a matter of fact, many engineers have paid little attention to a problem of privacy until now. In this paper, we propose a privacy model with two flows of information. This model shows that privacy is understood through the flow of information explicated by the relationship between 'self and 'other'. Self information is the one as an object to protect for the sake of ourselves. Other's information concerns if we ourselves select the information about others or not for some kinds of reason. We explain this model through describing scenarios. We finally believe that the proposed model could be a basis to help designers build systems with a balanced view between efficiency and privacy.