|
1. Emerging key social issue in Cyber Korea - Strongly questionable alternative : 강하게 의심되는 대안 - new formula : 새로운 방식 - Internet real-name use : 인터넷 실명제 - Online real-name verification : 온라인 실명제 - Introduction of the real name use system : 온라인실명제 도입 - Celebrities' X-file - Confidential report containing unconfirmed allegations : 확인되지 않은 소문을 포함한 기밀 문서 - Release of a confidential report : 기밀문서의 배포 - Posting articles on the message board : 게시판에 글을 올리는 것 - Gae ttong nyue (Dog shit girl) 2. Cyber crime cases - cyber terror : 사이버 테러 - cyber lynching : 사이버 폭력적 제재 - offensive behavior : 공격적인 행동 - linguistic violence : 언어적 폭력 - Hacking & Spreading virus - Financial crimes - Sales & illegal articles - Cyber pornography - Online gambling - Intellectual property crimes - Email spoofing : 이메일 속임수 - forgery - Cyber stalking - Piracy : 저작권 침해 - Cyber defamations : 사이버 명예훼손 - Slander/ Curse/ Bigotry /Libel : 모욕/ 명예훼손 - false information - groundless criticism : 근거없는 비난 3. Related objects - Spreader : 퍼뜨리는 사람 - Progressive civic group : 진보적 시민 단체 - Anonymous commentator : 익명의 주석자 - The world's most wired country : 세계최고의 인터넷망이 잘 구비된 나라 - the highest broadband internet penetration rates : 초고속 인터넷 전송율 - cyber mob attackers : 사이버 군중 공격자들 4. Applying procedure of online real-name use | 5. Infringement on the freedom of expression - "Big brother" intrusion into every life : 모든 사람들에 대한 정치권력자들의 침해 - hampering a social culture of sound debate : 바람직한 논쟁의 사회적 문화를 훼방함 - causing social division and conflict : 사회적 분리와 분쟁을 야기시킴 - pre-censorship : 사전검열 - freedom of Internet-based expression rooted in anonymity : 익명성에 근거한 인터넷 기반 표현의 자유 - human right violation in cyberspace : 사이버 공간에서의 인권 침해 - freedom of speech : 언론의 자유 - checking sound criticism : 바람직한 비판에 대한 견제 6. Unmatured citizenship - the qualm of conscience : 양심의 가책 - moral hazard : 도덕적 해이 - witch hunting:마녀사냥 - participatory democracy : 참여 민주주의 - public moral : 공공의 도덕 - social ethics : 사회적 윤리 - misconception and illusion : 오해와 환상 - people's maturity : 사람들의 성숙도 7. Private advocates - individual's consent : 개인의 동의 - unconstitutional : 위헌적인 - Infringement of privacy : 사적자유의 침해 - low-level notions on privacy : 사적자유에 대한 낮은 수준의 인식 - privacy protection : 사적자유의 보호 - confirmation of identity : 신원 확인 8. Alternative countermeasures - Widespread Education : 광범위한 교육 - harsh punishment : 가혹한 형벌 - strict law enforcement : 엄격한 법률의 집행 - enhancing accountability : 책임감을 향상시키는 것 - voluntary self regulatory effort : 자발적인 자기 규제 노력 |
------------------------------------------
Why Our Personal Values Matter More Than Ever Today
Heather Poole/ Technical writer
What’s important to you? Your morning coffee? Making time to walk your dog? Getting that assignment to your boss on time? Okay, but what’s valuable to you? According to Atlantic Magazine, 7 out of 10 Americans say people’s values have been getting worse in America over the past decade.[1] What are your personal values?
What Are Values?
Your values are a testament to your true self, because they are what matter most to you when it comes to personal and professional life. Your values influence that little voice in your head that tells you whether or not to care about something, and how you should prioritize your time. Your values are the things that you believe are important in the way you live and work.[2]
Your core values help determine what you truly want out of life, while simultaneously acting as the measuring stick you use to tell if you’re satisfied with your current situation and living in a meaningful way. Core values define who we are while helping us find our purpose. Here’re a few good examples of the core value words:[3]
Reliability | Dependable | Respectful |
Loyal | Committed | Teamwork |
Caring | Adventuros | Efficient |
Listening | Diversity | Humility |
Some of these values are instilled in you from childhood. They can be cultural or learned through watching your family and hearing their discussions about things they’re passionate about.
Perhaps now, in adulthood, you realize you’re passionate about those same things. It’s not a bad thing to share core values with those around you, but it can be detrimental to live a life that doesn’t honor those values.
How Do Core Values Affect Our Day-to-day Decisions?
We make decisions based on our values every day, but we sometimes forget about the important decisions we face, big and small, and the potential stress those choices can create.
When you can identify your values and make choices that align with them, life suddenly becomes a little easier. But when you’re running on autopilot and not allowing your values to coincide with your choices, you can find yourself becoming incredibly unhappy, and maybe you don’t know why.
Discovering your core values don’t help with huge aspects alone, they also impact seemingly small things, too. Remember that thing you bought that you didn’t really need, but you just felt like having? You made the decision that spending money wisely was not valuable to you. But is that truly how you feel? Now it’s the end of the month and bills are due. Perhaps it would be really helpful to have that money back, so it’s created stress. That disconnect stems from living a life that doesn’t correlate with your core values.
When you begin to make those choices that seem small at the time knowing what you find valuable, you begin to feel less stress in other aspects of your life. This has a snowball effect, and leads to continued better choices and prolonged stress-free existence. And the best part is, there’s no hard work needed, just some introspection and self-awareness. And if simply sitting alone for a few minutes could impact the rest of your life in a positive way, wouldn’t it be worth it? After all, knowing your values make important decisions, like accepting a job, starting a business, or making a big change, much easier.
How Do We Find Out Our Personal Core Values?
Core values are important to us. By figuring out the things which matter to us most, we can lead a better life. Here’re two ways to find out your personal core values:
- Start with what you already know about yourself; your morals.
Knowing your core values can certainly sync up with your morals. After all, your values have a direct impact on your standards of behavior.
Think about it: if it is morally important to you to arrive at your workplace and focus on nothing but work on company time, it will also be true that being an honest and efficient employee is a value you carry to every job you occupy.
Maybe you’re the kind of partner who puts their phone away when on a date. This probably means you are a morally loyal person and want to ensure your partner knows you value time with them. This is a strong indication that, as a core value, you put relationships first and work hard to show people you care. You could easily list respect and commitment to your list of personal core values.
- Your own experience will be your best tool in realizing what’s valuable to you.
For instance, think back to a time you were the happiest. Why were you so happy? Was the fulfilment you felt due to other people? Who were they? Think about when you were proud of yourself, and why you felt that pride. Your own experiences can shine great light on what you hold important.
And don’t be afraid to look ahead; what values do you want to exemplify to your children? If you want others to value it, it’s valuable to you.
What Should I Do With My Core Values?
Just sit down and make a list of what comes to mind, and let yourself explore those core values words. There is no set limit on how many values you can have, but allow yourself to list as many as you can.
- Prioritize Your Values
If you wind up with 20 words, consider crossing out those that barely made the list and prioritize your values.
Personal development blogger Steve Pavlina suggested identifying the top value, then the second highest value, and so on until you’ve rebuilt the list in order of priority from the top to the bottom.[4] As you’re trying to prioritize the values, have this question at the back of your mind: if I have to choose from these, which one go first and which one I can live without?
Some of the words may easily float to the top, where as others might stump you. Allow that to happen and accept that it aids in teaching you who you are.
- Look To Your Values Every Day
Once you’ve determined what your values are, it’s vital to look to them every day. We all face challenging situations and decisions, and Sam Whittaker put it best when he wrote,[5]
All [people] are thrust into tough situations from time to time…situations where the right thing to do isn’t obvious. Knowing which values are most important to you before these situations arise will help make you make better decisions.
So, let your values be valuable to you. Everyone is on their own path, and no one can tell you what your core values are but you.
- Don’t Be Afraid To Rework Your List In Future
When you realize your values and begin to live by them, you may find that not all of them are as important as you believed. Rework your list! You’re allowed to consciously change your values over and over again.
You are not your values. You are the thinker of your thoughts, but you are not the thoughts themselves. Your values are your current compass, but they aren’t the real you.[6]
Remember: Your values should aid in creating your best life, and your most authentic self. You make the rules. Be patient with yourself and dedicate the time to discovering your core values. You’ll be amazed at the things you can accomplish.
References
[1] ^ The Atlantic: 21 Charts That Explain American Values Today
[2] ^ MindTools: What Are Your Values?
[3] ^ ContentSparks: Big List of Core Value Words
[4] ^ Steve Pavlina: Living Your Values Part 1
[5] ^ Sam Whittaker: How to Define Your Personal Values
[6] ^ Steve Pavlina: Living Your Values Part 1
Article source : http://www.lifehack.org/569422/what-are-values-and-why-need-them-for-fulfilling-life?ref=category_section_post_6003
<Questions>
Q1. What are values? What is the roles of core values in your life?
Q2. What are your core values? Here’re a few good examples of the core value words.
Reliability | Dependable | Respectful |
Loyal | Committed | Teamwork |
Caring | Adventuros | Efficient |
Listening | Diversity | Humility |
Q3. How do core values affect your day-to-day decisions?
Q4. How do you visualize your core value in your real life?
Q5. Do you think What the core value of our society is?
Q6. Do you think your government is reliable? How about your company or your university? How about your boss or subordinate? If no, what is the reason for that?
--------------------------------------------
Hackers target colleges to steal personal data, university research
Cadie Thompson | @CadieThompson
Published 8:56 AM ET Thu, 21 Aug 2014 Updated 12:40 PM ET Thu, 21 Aug 2014
As college students head back to school, cybercriminals are heading back to work.
Hackers often target universities during the school year, and campuses are not equipped to handle the cybersecurity threats, according to a new report published Thursday by the security firm BitSight Technology.
In fact, colleges and universities fare worse than both the retail and health-care industries, when it comes to securing their networks, according to the report.
BitSight tracked the security performance of all colleges in major athletic conferences (Southeastern Conference, Atlantic Coast Conference, Pacific-12, Big 10, Big 12 and Ivy League) from July 2013 to June 2014. BitSight's research found that on average all conferences experienced a significant decline in their performance.
As the academic year progresses, school security defenses likely weaken because of the influx of students and devices on campus networks, said Stephen Boyer, BitSight's founder and chief technology officer.
All conferences saw a dip in their defenses, while students were back in school. But some conferences did fare better than others, according to the report.
On average, schools in the Big 12 scored higher for security performance than all the other conferences. The Atlantic Coast Conference ended the school year with the lowest security performance score.
Universities are gold mines for cybercriminals looking to cash in on people's personal information, Boyer said.
Everything from students' and faculty members' social security numbers to football fans' credit card information can be found on university networks.
Hackers may also be targeting universities because of the wealth of valuable research on the premises, he added.
"Interestingly, these universities are a trove of intellectual property. It's difficult to quantify monetarily speaking, but if someone breaks into the machines used by grad students in the lab, they just saved themselves two years of research," Boyer said.
And considering how intertwined universities are with other organizations—including government agencies—it's likely a university breach could put other critical organizations in jeopardy, Boyer said.
"It's really important to realize that cybersecurity is a systemic problem," he said. "We are all on the same network, problems in one area can lead to problem in another, especially in universities."
Malware, or malicious software, infections are among the biggest threats on college campuses. Flashback to the Trojan horse virus, which targeted Apple computers and stole personal information by disguising the virus as a browser plug-in. Such Trojan-like viruses are the most prevalent type of malware on college campuses, according to the report.
Other prevalent malware found on university networks include Adware, a kind of malware that targets users through online ads. Other persistent malware includes Conficker, which is a computer worm that targets Microsoft Windows operating system.
Boyer noted that schools with the highest scores had a dedicated director of information security or a chief information security officer on staff.
—By CNBC's Cadie Thompson
Article source : https://www.cnbc.com/2014/08/21/hackers-target-colleges-to-steal-personal-data-university-research.html
------------------------------------------
What are you revealing online? Much more than you think
Jul 1, 2014 / Thu-Huong Ha
How much are you prepare to reveal?
What can be guessed about you from your online behavior? Two computer privacy experts — economist Alessandro Acquisti and computer scientist Jennifer Golbeck — on how little we know about how much others know.
The best indicator of high intelligence on Facebook is apparently liking a page for curly fries. At least, that’s according to computer scientist Jennifer Golbeck (TED Talk: The curly fry conundrum), whose job is to figure out what we reveal about ourselves through what we say — and don’t say — online. Of course, the lines between online and “real” are increasingly blurred, but as Golbeck and privacy economist Alessandro Acquisti (TED Talk: Why privacy matters) both agree, that’s no reason to stop paying attention. TED got the two together to discuss what the web knows about you, and what we can do about the things we’d rather it forgot. An edited version of the conversation follows.
I hear so much conflicting information about what I should and shouldn’t be posting online. It’s confusing and unnerving not to know what I can do to protect myself. Can you both talk about that?
Alessandro Acquisti: My personal view is that individual responsibility is important, but we are at a stage where it is not sufficient. The problem is much larger than any one individual’s ability to control their personal information, because there are so many new ways every week or every month in which we can be tracked or things can be inferred about us. It’s absolutely unreasonable to expect consumers and citizens, who are all engaged in so many other activities, to also have the ability to continuously update their knowledge about what new tracking method the industry has discovered and to be able to fend it off. I think it’s a larger problem that requires policy intervention.
Jennifer Golbeck: I agree with that. Even if you did have a person who wanted to be on top of this and was willing to dedicate themselves full-time to keeping track of what technology can do, and then try to make decisions about what they can post, they still actually don’t have control.
Take language analysis, a really powerful tool where we look at the kinds of words that you use — not even necessarily obvious things like curse words, but things like function words: how often you use “I” versus “we,” how often you use “the” versus “a,” these little words that are natural in the way that you develop language and inherent to your personality. It turns out that those reveal all sorts of personal traits. There’s a whole field of psycholinguistics in which people are doing deeper research into comparing the kinds of words you use and how often you use them with personal attributes, and that’s not something you can understand or control.
AA: It’s also difficult to predict how information you reveal now could be used five or ten years out, in the sense of new inferences that could be discovered. Researchers may find that a piece of information “A” combined with a piece of information “B” can lead to the prediction of something particularly sensitive — also in the sense of how this particularly sensitive information could be used. These are literally impossible to predict, because researchers every month come up with new ideas for using data. So we literally do not know how this will play out in the future.
What would a policy solution look like?
JG: Right now in the U.S. it’s essentially the case that when you post information online, you give up control of it. So there are terms of service that regulate the sites you use, like on Facebook and Twitter and Pinterest — though those can change — but even within those, you’re essentially handing control of your data over to the companies. And they can kind of do what they want with it, within reason. You don’t have the legal right to request that data be deleted, to change it, to refuse to allow companies to use it. Some companies may give you that right, but you don’t have a natural, legal right to control your personal data. So if a company decides they want to sell it or market it or release it or change your privacy settings, they can do that.
In Europe, users have more of a right to their data, and recently there was a decision in Spain where a man had sued Google because when people searched for him, it was coming up with information about financial problems that he had had a long time ago. He was basically arguing that he has a right to have this information forgotten about him. When we declare bankruptcy, for example, that stays on our credit report for seven years; it’s not going to be there 30 years later. But a lot of this stuff on the Internet, including public-record stuff, does stick around well past the time that we would allow it to expire before, and users don’t have control over that online.
So Europe is saying users have a right to own their data in a certain way, and in the U.S. we don’t have that. That’s one of the spaces where there are some clear and straightforward legal solutions that could hand control, at least in some part, back to the users.
“There are a number of ways in which transparency control can be bypassed or muted.” Alessandro Acquisti
AA: If you go back to the 1970s, the Organization for Economic Cooperation and Development (OECD) — so not exactly an anti-business or anti-capitalist organization — came up with a number of principles related to handling personal data. These Fair Information Practices, or FIPs, were guidelines for what policymakers could do to make the handling of personal information fair.
If you look at those principles, and then you look now at the state of policymaking in the United States when it comes to privacy, you see a significant difference. The policymaking effort in the U.S. focuses almost exclusively on control and transparency, i.e. telling users how their data is used and giving them some degree of control. And those are important things! However, they are not sufficient means of privacy protection, in that there are a number of ways in which transparency control can be bypassed or muted. What we are missing from the Fair Information Practices are other principles, such as purpose specification (the reason data is being gathered should be specified before or at the time of collection), use limitation (subsequent uses of data should be limited to specific purposes) and security safeguards.
Alessandro, in your talk you mentioned an experiment in which it took only 15 seconds for transparency — in this case, a privacy policy — to be rendered ineffective for users.
AA: Indeed. A very interesting aspect of that experiment is that people do remember what we told them about how we would use their data. But adding this delay between the time that we told them how their data would be used and the time where we actually started asking them to make choices about their data was enough to render that notice ineffective. That’s probably because their minds started wandering.
JG: We are actually in the middle of a project where we’ve been showing people the Facebook privacy policy, and then alternatively having them watch this interactive video called “Take This Lollipop,” which is one of my favorite privacy-oriented things online. It’s an interactive personalized horror movie where this creepy stalker guy looks at your Facebook profile — which is generated because you click “Connect with Facebook” when you go to the website — and he looks at all your pictures and gets really angry and then kind of tracks you down.
When it first came out, I remember thinking, “Oh, I’m not going to bother trying this, because I’m one of the people in the world who knows the most about Facebook privacy settings. I have them cranked up so high; there’s no way it could possibly see anything on my profile.” A week later, I thought, “Well, you know, let’s click on it and see,” and it got all this data that I didn’t think it could get. I remember thinking, if I don’t understand what kind of data is being given to apps, how can anybody else understand?
We found that having people watch the video made them more informed and understand better what information was being shared than anything else. Now that doesn’t necessarily mean it’s the way that you want to convey a privacy policy, because it does show deep risk in some of this information being shared when it’s not necessarily as risky as that video conveys, but I think this is an interesting point.
AA: To explain this phenomenon I borrow the term “rational ignorance.” Rational ignorance has been used in other fields to refer to situations where people rationally decide to remain ignorant about a certain topic because they expect that the costs involved in making an effort will not be offset by the benefit of getting this information. Sometimes, in privacy, we may feel the same way. Sadly, sometimes correctly so: we may do everything to protect ourselves and do everything right, and still our data is being compromised or used in manners that we don’t know about and don’t want. And therefore, some of us may give up, and decide not even to start protecting ourselves.
“It’s really important that people understand that there are computational techniques that will reveal all kinds of information about you that you’re not aware that you’re sharing.” Jennifer Golbeck
JG: At the same time, the thing that I’ve had a hard time communicating in the years that I’ve been doing this work is for people to really understand that we can find things out computationally that they’re not sharing explicitly. So you can “like” these pages, you can post these things about yourself, and then we can infer a completely unrelated trait about you based on a combination of likes or the type of words that you’re using, or even what your friends are doing, even if you’re not posting anything. It’s things that are inherent in what you’re sharing that reveal these other traits, which may be things you want to keep private and that you had no idea you were sharing.
So on the one hand, it’s true that even if you know about all these computational techniques, you can’t necessarily protect yourself. On the other hand, it’s really important that people understand that there are computational techniques that will reveal all kinds of information about you that you’re not aware that you’re sharing.
How is what’s happening on the Internet different from people analyzing the way I dress, cut my hair, where I work or where I live? I don’t give people on the streets permission to judge those things, but they do it anyway.
AA: It’s different on at least two grounds. One is scale. We are talking here about technologies that vastly increase the kind of abilities that you’re describing. They make them more sophisticated. They allow many more entities — not just the friends you meet in your day-to-day life, but entities across the world — to make inferences about you. This data remains somewhere and could be used later to influence you.
The second is asymmetry. We all grow up developing the ability to modulate our public and private spheres, how much we want to reveal with friends, how much we want to protect. And we are pretty good at that. But when we go online, there is an element of asymmetry, because there are entities we don’t even know exist, and they are gathering continuously information about us.
“The point is, we really don’t know how this information will be used.” Alessandro Acquisti
To be clear, I’m not suggesting that all this information will be used negatively, or that online disclosures are inherently negative. That’s not at all the point. The point is, we really don’t know how this information will be used. For instance, say I’m a merchant — once I get information about you, I can use this information to try to extract more economic surplus from the transaction. I can price-discriminate you, so that I can get more out of the transaction than you will.
That’s why I’m interested in working in this area, not because disclosure is bad — human beings disclose all the time, it’s an innate need as much as privacy is — but because we really don’t know how this information will be used in the long run.
JG: You pick what clothes you wear, you pick the neighborhood you live in, you pick the job that you have — and in some way you know what that’s saying about you. Say you’re Catholic. Some people are going to associate one thing with you being Catholic, and some people are going to associate another. You have an easy way to understand what all the reactions will be.
But the kinds of things that we’re talking about online aren’t things that you can necessarily anticipate. One example of this is a pretty early project from a couple of undergrads at MIT called “Project Gaydar.” They were able to infer people’s sexual orientation by completely ignoring anything that the person had actually said and instead looked at the person’s friends and what they had disclosed about themselves. So even if you’re a person who wanted to keep their sexual orientation private, we can still find it out, and there’s nothing you can do about it.
We have such a huge base of data — hundreds of millions of people, combinations of actions, likes and words. By themselves, it’s a pile of traits that doesn’t mean anything. Yet we can detect small patterns among these hundreds of millions of people to pretty accurately infer information that has basically no relationship to what they’re choosing to disclose.
Once those algorithms are mapped out, how do you keep them from being used for evil? Do you worry your research could be used by less genuine entities?
JG: I sometimes tell people that I feel a bit like I’m working on the Manhattan Project. But I actually approach this from a scientific perspective. I’m interested in the science of it, and I think pretty universally, with very few exceptions, it’s always worth doing the science. And in fact, what we’re doing to infer these things can actually be used to teach people how to protect themselves. One of the things that we learned through this research is that the more data we have about people, the easier it is to make inferences about them. That has led me to be a regular purger of all my information online. That’s a lesson that comes out of the science.
You’re right that this stuff is going to get into the hands of companies, governments, and could potentially be used in evil ways. I don’t think not doing the science is the solution to that. As Alessandro said earlier, the only solution is a legal one where people have control over how their data is used and there are limitations and real regulation on data brokers and other companies that have this data.
AA: I doubt that even the best researchers are able to give ideas to the industry that have not already come up or will not come up soon by themselves. In the best scenario, we are maybe one or two steps ahead of the game. And that would be important, because it’s about raising awareness among individuals and among policy makers about things that are about to happen, or have started to happen.
Article source : http://ideas.ted.com/do-you-know-what-youre-revealing-online-much-more-than-you-think/?utm_campaign=social&utm_medium=referral&utm_source=facebook.com&utm_content=ideas-blog&utm_term=technology
--------------------------------------------
< Questions >
Q1. How Vulnerable are You to Cyber Attack?
Q2. Do you think how much do you aware of online hacking on private information?
Q3. Do you use any SNS on the internet? Why do you use it?
Q4. What are the merits and demerits of using SNS?
Q5. If you want to know about someone, how would you get the information on her/ him? By asking in person, searching the website or any other route?
Q6. Do you want to erase every item related to your personal info. on the internet if it is possible?
Q7. Do you think should we make more stronger penalty system for those who are hacking information on the web site without permission?
--------------------------------------------
Lawmakers, experts propose Intellectual Property Day
Published : 2015-04-23 20:11
As the international community prepares to celebrate the 2015 World Intellectual Property Day on Sunday, South Korean lawmakers, intellectuals and high-level officials on Thursday vowed to step up efforts to strengthen IP protection by declaring the nation’s own inaugural Intellectual Property Day.
The World Intellectual Property Association of Korean Practitioners, launched by the Science Ministry in 2013, held a ceremony at the National Assembly to establish this new day, which aims to promote and move forward measures to protect IP.
“South Korea is among the top five IP powerhouses in the world, alongside the United States, Germany, China and Japan and has immense potential for further growth,” said National Assembly Vice Speaker Chung Gap-yoon, also the head of a new organization launched to establish Korea as an intellectual hub for IP protection.
Chung emphasized Korea’s potential to grow as a center of international intellectual property protection, particularly in Northeast Asia, stating that Korea has a competitive edge against its neighbors ― “Japan is highly nationalistic” whereas “China still takes orders from the top government,” according to the lawmaker.
As the number of patent applications in the world surpassed 2.6 million in 2013, South Korea was fourth among the top five patent offices which together received 80 percent of all applications, according to a 2014 report by the World Intellectual Property Organization.
“Though Korean companies own many excellent forms of intellectual property, they are reluctant to bring patent issues to domestic courts,” Chung added, emphasizing the need to establish a dependable court system in the country to oversee patent, copyright and trademark issues.
Amendments to the Court Organization Act to strengthen and better systemize patent courts in the country are currently underway, according to the Saenuri lawmaker Thursday.
“Korea must work toward fostering more experts (on IP protection), expediting patent trials and proving to related actors that the (Korean legal system) can effectively protect their intellectual property rights,” he said.
The United Nations defines intellectual property as “creations of the mind, such as inventions; literary and artistic works; designs and symbols, names and images used in commerce.”
Intellectual property is protected through patents, copyright and trademarks, which enable people to earn recognition or financial benefit from what they invent or create.
The theme of this year’s U.N. World IP Day on Sunday is “music.” It will be a day to “‘get up, stand up, for music’ ― to ensure that our musicians get a fair deal, and that we value their creativity and their unique contribution to our lives,” said WIPO’s Director General Francis Gurry in a celebratory message.
By Sohn Ji-young (jys@heraldcorp.com)
Source : http://www.koreaherald.com/view.php?ud=20150423001023
--------------------------------------------
Q1. What is the Intellectual Property rights ?
Q2. Have you ever used other's idea without author's permission ?
Q3. Do you think Korea have enough qualities in taking a role as a main hub for
intellectual property right? How about the attitude of Korean company,
intellectual group of people or ordinary people's mindset for intellectual property right?
Q4. Have you ever registered your creative ideas with patent ?
Q5. Do you know what kinds of laws are enacted in Korea to manage
IPR(intellectual property rights) infringement ? How about punishment for that crime?
--------------------------------------------
How To Stop People Stealing Your Ideas
A Life/Work Lesson/ By Paul Suggett
I get a lot of letters and emails asking me "how do I keep my ideas safe?" and "how can I make sure that my ideas remain my ideas?" Or, to go one better, "what do I do if someone steals my ideas?" And to many, these are tricky questions.
For instance, we now live in a world that allows the sharing of ideas instantly across many platforms. We also have to embrace modern technology and have online portfolios - portfolios that can be accessed by anyone, at anytime, anywhere in the world.
Students are particularly vulnerable to this "larceny of ideas." They have books chock full of ideas that have never been printed or published. They have ownership of them, intellectually, but they don't have a way to keep their ideas safe and sound. If they keep them in a physical portfolio, they'll do themselves a massive injustice. Those ideas need to be seen by many, many potential employers, and the quickest and easiest way to disseminate that information is through an online portfolio.
If you've won awards, you at least have some real proof that you got there first, so to speak. But even then, award-winning work has been pilfered and re-animated. It's also won awards, despite coming from a less than honorable origin.
So what do you do?
How do you keep you ideas safe? The Answer is Two Words…
YOU DON'T.
I'll let that sink in for a moment, although I suspect a lot of you already knew it deep down.
Advertising ideas are not patented. They aren't precious, and they are certainly not safe from prying eyes and ears. They get ripped off. Stolen. Half-inched. Thieved. Copied. Carved up and repackaged. And this has been going on for decades.
When physical portfolios were going around advertising agencies, the best ideas were photocopied and kept in a file. I never did this, but I saw people do it. And I have heard stories of filing cabinets filled with student ideas.
These days, creatives will often scour student portfolios looking for new ideas and directions. They will look at award websites and see what can be copied and reconstituted. It's not illegal. It's perhaps a bit unethical. But it's certainly not something that is going to go away any time soon.
Yet this bring us back full circle to one of the first questions at the beginning of this article.
"What do I do if someone steals my ideas?"
There's a simple answer to this one, and you may not like it. But you will have to accept it, and know that if you do, you'll be better off. The answer is…
JUST KEEP HAVING BETTER IDEAS.
That's it.
It seems obvious because it is. Think about it this way. If people keep ripping off your ideas, they will eventually come to the source. After all, why go to the time and trouble of trying to recreate lightning in a bottle, when you can hire the person who knows how to do it.
If you are always pushing out better and better ideas, you, as the creator, will be in demand. And the best part is that if you're talented, you call the shots and you steer the ship. In fact, you could be as cocky as to tell people to steal your ideas. Why not? "Go ahead, have them. I've got bigger, better ones in my head, and they'll be going to a rival agency…unless you'd like to play ball?"
Ideas cannot be locked up. They can't be kept safe and sound. But they can be your key to getting great work for years to come. So keep having those great ideas. They're your ticket to a fantastic career.
Article Source : http://advertising.about.com/od/creatingads/a/How-To-Stop-People-Stealing-Your-Ideas.htm
--------------------------------------------
< Questions >
Q1. Have you ever felt that someone or certain group of people are trying to steal your ideas ? When you found out the fact, what was your respond to it ?
Q2. Do you think there are any ways to stop them from stealing your ideas or collection of ideas which is planning ?
Q3. We are living in the open society using freely accessible internet use. Therefore, sometimes our ideas can go through the internet without our permission by your acquaintance or by hacking. But mostly those happenings have something to do with lack of understanding or violation of intellectual property right. Basically, those incidents have to be managed by the law. However, Korean society have very low understanding on this matter.
If your collection of ideas were spreading without your permission, do you have any intention to act legal action toward those group of people? And do you think it is acceptable ethically? How can we protect the ideas from those group of people?
Q4. There are three types of people around us in this world. They are 'GIVER', 'MATCHER' and 'TAKER'. 'GIVER' is a certain type of person who tries to help people and gives more things than what they are taking. However, 'Taker' is more like a selfish person who is taking more things than what they are giving to others. and 'MATCHER' is a certain group of person who is between two types.
Do you think What type of person you are ? And are there any possibilities for the 'GIVER' to be survived in the Korean society? If they can not, what can be the survival strategies?
Q5. Nowadays, many people talk about the 'Creative Society'. However, with those social understanding level on the intellectual property right, is it possible to build up sound discussion culture to develop their ideas? If people still do the discussion under these collcting culture of ideas, Isn't it a deceiving activities ? plz share your ideas !~
Q6. Have you ever had your intellectual property stolen? Like an idea or project?
Q7. What is your opinion about current intellectual property cases in the courts?
Try to think of some major ones in the news.
--------------------------------------------
The innovation game
Global innovation rankings/ Sep 17th 2015, 12:50 BY L.S. & THE DATA TEAM
WHICH is the world’s most innovative country? Answering this question is the aim of the annual Global Innovation Index and a related report, which were published this morning by Cornell University, INSEAD, a business school, and the World Intellectual Property Organisation. The ranking of 140 countries and economies around the world, which are scored using 79 indicators, is not surprising: Switzerland, Britain, Sweden, the Netherlands and America lead the pack. But the authors also look at their data from other angles, for instance how countries do relative to their economic development and the quality of innovation (measured by indicators such as university rankings). In both cases the results are more remarkable. The chart above shows that in innovation many countries in Africa punch above their economic weight. And the chart below indicates that, even though China is now churning out a lot of patents, it is still way behind America and other rich countries when it comes to innovation quality.
Article source : http://www.economist.com/blogs/graphicdetail/2015/09/global-innovation-rankings?fsrc=circ%7Ccnt%7Cfbasiasf
--------------------------------------------
< Questions >
Q1. What is the definition of innovation? Why do we need innovation? Do you think you are innovative person in your area?
Q2. According to an article, which country would be the most innovative one?
Q3. A second graph shows us the Innovation quality according to the countries. And United states is still the most competitive nation in terms of innovation quality. What is the reason for that?
Q4. From an article, It was revealed that South Korea is ranked in a 8th place. Do you think our society is innovative enough?
Q5. Many people feel stressful about keeping up with innovative trends always. How do you handle your stress level? Plz share your own ways to reduce stress.
Q6. Where are the innovation coming from? Ideas?, power of execution? How to build up our innovative mindset?
--------------------------------------------
The Internet of Things
Graphic source : http://www.talk2thefuture.com/internet-of-things-english/
The Internet of Things has dozens of definitions, but they generally all talk about using the Internet (which people are accustomed to using for email, social networking, web browsing and e-commerce) as the backbone for communication by sensors, actuators, devices, buildings, streets, machines and smart cities.
The Internet Of Things |
Are You Ready For The Promise Of A Connected World?
The Internet of Things (IoT) is emerging as the third wave in the development of the Internet. The 1990s’ fixed Internet wave connected 1 billion users while the 2000s’ mobile wave connected another 2 billion. The Internet of Things has the potential to connect 10 times as many (28 billion) “things” to the Internet by 2020, ranging from bracelets to cars, blurring the lines between hardware, software, and mobile.
We stand at the dawn of a new age, just as the smartphone revolutionized personal computing by creating a computer that most of us have within arm’s reach 24 hours a day. The Internet of Things promises to revolutionize computing again, by connecting and collecting data from everything we live in, drive in, eat in, sleep in and work in.
IoT devices to date have been pieces of hardware that connect to an app on your smartphone, which allows you to interact with them. The connected watch signals an important shift as it combines the hardware and sensors with the software and user interface into one device. While it still requires a connected phone to connect to the Internet, it is easy to see a future connected watch that eliminates the need for the phone entirely.
As IoT devices evolve, they will take on more “mobile” qualities and become the new home for many functions we currently rely on our smartphones to perform. In addition to making search obsolete, IoT could make the smartphone largely irrelevant in the near future.
The Internet of Things promises to revolutionize computing again, by connecting and collecting data from everything
In just a year or two, the number of IoT devices will outnumber the number of PCs, smartphones and laptops globally. Forecasts range from as low as 41 billion to as high as 80 billion connected devices worldwide by 2020.
For years people have been claiming that search is dead, but we still find ourselves on Google looking for a restaurant, searching for the best ski equipment or researching a new company. However, the promise of IoT means never having to search again. With every connected device you have, more data is collected about you, your habits, your needs and your preferences. When this data is aggregated, a complete virtual profile of you emerges. This profile will know what you need before you do.
The “virtual you” will be able to anticipate your needs, perform the necessary search, and deliver what you need, before you even have to ask. It will be able to adjust your thermostat before you realize you are too hot, or place an order for tissues before you notice you have run out. Obviously, search still happens, but it is all done behind the scenes. If the Internet of Things becomes what we believe it can be, you’ll never need to visit the Google homepage again.
Are you ready for the Internet of Things? Or are you concerned about the massive violation of privacy that such a Thing implies?
Unlocking the potential of the Internet of Things
June 2015 | byJames Manyika, Michael Chui, Peter Bisson,
Jonathan Woetzel, Richard Dobbs, Jacques Bughin, and Dan Aharon
The Internet of Things—sensors and actuators connected by networks to computing systems—has received enormous attention over the past five years. A new McKinsey Global Institute report, The Internet of Things: Mapping the value beyond the hype, attempts to determine exactly how IoT technology can create real economic value. Our central finding is that the hype may actually understate the full potential—but that capturing it will require an understanding of where real value can be created and a successful effort to address a set of systems issues, including interoperability.
To get a broader view of the IoT’s potential benefits and challenges across the global economy, we analyzed more than 150 use cases, ranging from people whose devices monitor health and wellness to manufacturers that utilize sensors to optimize the maintenance of equipment and protect the safety of workers. Our bottom-up analysis for the applications we size estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. At the top end, that level of value—including the consumer surplus—would be equivalent to about 11 percent of the world economy (exhibit).
Achieving this kind of impact would require certain conditions to be in place, notably overcoming the technical, organizational, and regulatory hurdles. In particular, companies that use IoT technology will play a critical role in developing the right systems and processes to maximize its value. Among our findings:
•Interoperability between IoT systems is critical. Of the total potential economic value the IoT enables, interoperability is required for 40 percent on average and for nearly 60 percent in some settings.
•Currently, most IoT data are not used. For example, on an oil rig that has 30,000 sensors, only 1 percent of the data are examined. That’s because this information is used mostly to detect and control anomalies—not for optimization and prediction, which provide the greatest value.
•Business-to-business applications will probably capture more value—nearly 70 percent of it—than consumer uses, although consumer applications, such as fitness monitors and self-driving cars, attract the most attention and can create significant value, too.
•The IoT has a large potential in developing economies. Still, we estimate that it will have a higher overall value impact in advanced economies because of the higher value per use. However, developing economies could generate nearly 40 percent of the IoT’s value, and nearly half in some settings.
•Customers will capture most of the benefits. We estimate that IoT users (businesses, other organizations, and consumers) could capture 90 percent of the value that IoT applications generate. For example, in 2025 remote monitoring could create as much as $1.1 trillion a year in value by improving the health of chronic-disease patients.
•A dynamic industry is evolving around IoT technology. As in other technology waves, both incumbents and new players have opportunities. Digitization blurs the lines between technology companies and other types of businesses; makers of industrial machinery, for example, are creating new business models by using IoT links and data to offer their products as a service.
The digitization of machines, vehicles, and other elements of the physical world is a powerful idea. Even at this early stage, the IoT is starting to have a real impact by changing how goods are made and distributed, how products are serviced and refined, and how doctors and patients manage health and wellness. But capturing the full potential of IoT applications will require innovation in technologies and business models, as well as investment in new capabilities and talent. With policy actions to encourage interoperability, ensure security, and protect privacy and property rights, the Internet of Things can begin to reach its full potential—especially if leaders truly embrace data-driven decision making.
<Questions>
Q1. Have you ever heard about the 'Internet of Things' ? What is the definition of IOTs?
What are the most controversial issues on this matter?
Q2. What are the advantages and disadvantages of those IOT technologies?
Q3. Do we have safe security protection system technologically and socially in terms of development of IOT technology in our society?
Q4. Did you watch the movie 'transcendence'? The concept of connceted world sounds fancy and
beneficial to humanbeing due to the efficiency of technology application, however it is provoking
me worries related to humanitarian issues. How about your feelings on this movie?
Q5. In the perspective of application of this technology, where you want to apply those technology
is the matter of concern. If you apply this tech. into energe managmemt or
public safety & traffic control management and etc., it would bring best benefits into the society.
If you are a mayor of your city, where will you apply this tech in your territory?
Q6. From the article, computer can predict your future decision making by observing and analysing
all your past behaviors using connected technological infrastructure.
Why people want to predict your future behaviors?
Do you think you act based on the past habitual behaviors?
Q7. Do you think 'Vertual yourself' can exist in the world and sustitute your own desire?
Q8. We cannot prohibit spreading of all those fancy technologies inspite of various worries such as
labor substitution by machine, hacking problem and pravacy infringement.
Then, what should we prepare for the future?