• Title/Summary/Keyword: 규제준수

Search Result 124, Processing Time 0.02 seconds

A study on the Improvement of Private Investigators System in Korea (한국 민간조사제도의 발전방향: 시험제도와 교육훈련 중심(中心)으로)

  • Lee, Sang-Won;Park, Yun-Kyu
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.337-365
    • /
    • 2007
  • The society shows rapid change throughout various fields in the 21 century. These changes are in progress in Korea as well and the private security field is not in exception. The private security system has socially effective function by providing services, which the police cannot provide to citizen. However, it cannot be treated rightly the possibility of violation of human right during the actual action. The qualified person at least should take private investigation service considering privatization of criminal justice and considering that the Private Investigation Act submitted to the Congress could not affect its investigation authority to the citizen currently. The purpose of this study is examination of the private investigation system in Korea and other country and is presentation of its improvement. The chapter 1 composed of introduction on chapter 1, concept and service in chapter 2, private security system in other countryin chapter 3, private security system in chapter 4, problems and its improvements in chapter5, and conclusion in chapter 6. It requires not only consideration of government but also consideration of citizen and effort of both sidesto successful settlement of private security system in Korea.

  • PDF

Unmanned aerial vehicle routing algorithm using vehicular communication systems (차량 통신 시스템 기반 UAV 라우팅 알고리즘)

  • Kim, Ryul;Joo, Yang-Ick
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.7
    • /
    • pp.622-628
    • /
    • 2016
  • The prosperity of IT technologies and the removal of restrictions regarding Unmanned Aerial Vehicles (UAVs), also known as drones, have driven growth in their popularity. However, without a proper solution to the problem of accident avoidance for UAVs, this popularity increases the potential for collisions between UAVs and between UAV and terrain features. These collisions can occur because UAVs to date have flown using radio control or image recognition based autonomous navigation. Therefore, we propose efficient UAV routing schemes to tackle the collision problem using vehicular communication systems. Performance evaluation by computer simulation shows that the proposed methods effectively reduce the collision probability and improve the routing efficiency of the UAV. Furthermore, the proposed algorithms are compatible and can be directly applied with small overhead to the commercial vehicular communication system implementation.

A Study of the Rationalization of Handling Facility Safety Management Standard for Hazardous Chemicals : Focusing on Dike (화학물질 안전관리 시설기준 합리화 연구 : 방류벽 중심)

  • Kim, Nam-Suk;Yoo, Byung-Tae
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.2
    • /
    • pp.29-35
    • /
    • 2020
  • The Chemical Control Act has revised in 2015 to promote chemical safety, particularly enhancing the standards for the installation and management of hazardous chemical handling facilities. However, in some existing facilities, it was difficult to comply with some facility standards because of lack of land, safety accident possibility during rebuilding. In this study, we attempted to provide a more rational approach of dike standard which was the highest(2017: 117, 2018: 83) complaint for two years(2017~2018, 1,087) by prior study, FLACS simulation, analyze safety management standard and conduct a survey. Therefore, considering the purpose of installing the discharge wall only at existing facilities in operation, additional sensors that can detect chemical leakage and leakage were recognized as an additional alternative to installing and operating closed circuit television (CCTV). This will help the safety and cost aspects of small or medium-sized businesses or small and medium-sized enterprises that cannot secure legal grounds or fail to enforce legal regulations due to economic problems such as construction costs.

Study on IT security audit system for e-commerce private information protection (전자상거래 개인정보보호를 위한 IT보안감사체계 연구)

  • Lee, Eun-kyoung;Park, Byoung-woo;Jang, Seok-eun;Lee, Sang-joon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.179-182
    • /
    • 2018
  • 최근 여기어때, 인터파크 등 전자상거래 기업을 대상으로 발생한 개인정보 해킹사고 사례를 보면, 사람의 취약점을 노리는 지능화지속위협(APT) 공격과 알려진 해킹 기술이 복합적으로 이루어지고 있다. 해킹사고가 발생한 기관은 한국인터넷진흥원(KISA) 정보보호관리체계(ISMS) 의무대상 기관으로써 정보보호관리체계를 유지 관리하고 있었다. 그럼에도 불구하고 대형의 개인정보 유출사고가 발생한 주요 원인은 정보보호관리체계가 적용되지 않았던 정보시스템과 인력을 대상으로 해킹이 이루어졌기 때문이다. 해킹 위협의 변화에 따라 전자상거래 보안 수준도 변화해야 하는데, 개인정보보호 관련 규제 준수도 전자상거래 기업에서는 힘든 상황이다. 고객의 개인정보 유출 사고는 일반인을 매출 기반으로 서비스하고 있는 전자상거래 기업에서는 치명적이다. 안전한 전자상거래 플랫폼 기반에서 고객에게 서비스를 제공하기 위해서는 무엇보다도 중요 자산인 고객의 개인정보보호를 위해 역량을 집중해야 한다. 한정된 예산과 자원으로 안전한 서비스를 제공하기 위해서는 기존에 구축된 정보보호관리체계를 기반으로 IT보안감사체계를 전사적으로 확대하여 지속적으로 모니터링 할 필요가 있다. 이에 본 연구에서는 최신 사이버 보안 위협 동향과 전자상거래 기업 대상으로 발생한 최근 개인정보유출사고 사례를 분석을 통해 시사점을 도출하여 전자상거래 개인정보 보호를 위한 IT보안감사체계를 제시하였다.

  • PDF

A Study on Security Container to Prevent Data Leaks (정보 유출 방지를 위한 보안 컨테이너의 효과성 연구)

  • Lee, Jong-Shik;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1225-1241
    • /
    • 2014
  • Recently, Financial companies implement DLP(Data Leaks Prevention) security products and enforce internal controls to prevent customer information leaks. Accidental data leaks in financial business increase more and more because internal controls are insufficient. Security officials and IT operation staffs struggle to plan countermeasures to respond to all kinds of accidental data leaks. It is difficult to prevent data leaks and to control information flow in business without research applications that handle business and privacy information. Therefore this paper describes business and privacy information flow on applications and how to plan and deploy security container based OS-level and Hypervisor virtualization technology to enforce internal controls for applications. After building security container, it was verified to implement internal controls and to prevent customer information leaks. With security policies additional security functions was implemented in security container and With recycling security container costs and time of response to security vulnerabilities was reduced.

SO2 Emission Permits Tradable under Exchange Rates : U.S. Case (다수 거래비율하에서의 SO2 배출권 거래 : 미국 사례)

  • Hlasny, Vladimir
    • Environmental and Resource Economics Review
    • /
    • v.20 no.4
    • /
    • pp.689-733
    • /
    • 2011
  • This study evaluates a novel scheme to trade sulfur dioxide emission permits subject to non-uniform rates. These rates are based on generators' marginal costs of compliance with environmental policy in a hypothesized least social-cost solution. This scheme is compared against the existing trading program used by the U.S. Environmental Protection Agency, featuring permits tradable one for one. Both policies are modeled to yield identical aggregate emissions. A numerical partial-equilibrium model of the U.S. energy industry is used to infer sulfur dioxide concentrations and health damages, as well as producer and consumer surplus, under the two policies. Regional pollution levels are found to vary across the two policies significantly. The system of exchange rates is estimated to outperform the uniform-trading scheme by $2.2 billion in industry profits and $2.1 billion in health damages, but to reduce consumer surplus by $6.7 billion. Paradoxically, exchange rates are thus estimated to lower total welfare by $2.5 billion. This is due to conceptual mechanism-design problems, as well as empirical issues.

  • PDF

Policy Tasks in the Enforcement of the Police Order With Regard to Electronic Security (기계경비업무 감독명령 시행의 정책과제)

  • Ha, Kyungsu;Lee, Sangchul
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.200-207
    • /
    • 2014
  • In this research, The Police Order No. 2013-1, which is 'Electronic Security 112 Report Standards,' was analyzed and the relevant policy tasks were presented. The policy tasks to achieve the purpose of the selective report system are as follows. First, in order to construct the statistics base, the establishment of the terms related to false alarm and false call, emergency button, and sensing signal and the development of the appropriate term to replace the electronic security guard are needed. Second, the electronic security companies should build the response system to abide by the 112 report standards of the police order. Third, the police should reexamine the establishment of the emergency report objects of the selective report system. Fourth, the reinforcement of the administrative regulation and supervision to enforce the police order strictly is required.

Effect of Ultrasonic Irradiation on On-board Fuel Analyzed Using Gas Chromatography/Mass Spectrometry (GC/MS를 이용한 선박연료유에 대한 초음파조사 효과 분석)

  • Choi, Jung-Sik
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.6
    • /
    • pp.890-897
    • /
    • 2021
  • Since the enforcement of strict regulations on marine fuel oil sulfur content, demand for Low Sulfur Fuel Oil (LSFO) has been increasing. However, as LSFO properties vary greatly depending on the supply timing, region, and supplier, LSFOs can experience problems with sludge formation, blending compatibility, and stability once mixed into storage tanks. This study investigates using ultrasound cavitation effects to improve the quality of LSFOs in storage tanks. For marine gas oil (MGO), the results showed that the relative ratio of high molecular weight compounds to those of low molecular weight decreased after ultrasonic irradiation, due to cavitation-induced cracking of chemical bonds. For marine diesel oil (MDO) and blended oil, a small increase in the relative abundance of low weight molecular compounds was observed after treatment. However, no correlation between time and relative abundance was observed.

Study on Forestry-Based Carbon Offset Programs (산림을 이용한 탄소상쇄 프로그램의 해외 사례 고찰)

  • Lee, Seung-Eun
    • Journal of Climate Change Research
    • /
    • v.1 no.2
    • /
    • pp.97-107
    • /
    • 2010
  • A forest project for the sequestration of carbon dioxide helps to reduce the concerntration of greenhouse gas in atmosphere and provides various co-benefits. A lot of forestry-based carbon offset programs have been developing for the purpose of CSR(Corporate Social Responsibility), voluntary GHG emission reduction, and regulatory context etc. in worldwide. We studied major characteristics - project type and criteria, additionality, credits, permanence, carbon accounting and monitoring, co-benefit - of advanced forest carbon offset programs. Also, we tried to comprehend the direction and basic elements to design a domestic program.

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.