• Title/Summary/Keyword: 대응행위

Search Result 502, Processing Time 0.025 seconds

A Study on the Legal Liabilities and Countermeasures against Piracy (해적행위에 대한 법적 책임과 대응방안)

  • Choi Suk-Yoon;Lee Yun-Cheol;Hong Sung-Hwa;Park Jeong-Ki
    • Journal of Navigation and Port Research
    • /
    • v.29 no.1 s.97
    • /
    • pp.43-58
    • /
    • 2005
  • Piracy is the enemy of the human race. Pirates commit acts of murder, robbery, plunder or other villainous deeds at sea, cruelly against humanity. The Republic of Korea(ROK), as a big maritime country, is obliged to suppress piracy under international treaties it ratified, including the UN Convention on the Law of the Sea and the two 1988 Conventions against maritime terrorism The Korean government is recently taking a positive attitude towards the regional cooperation which is necessary for the suppression of piracy in the waters of Southeast Asia In spite of the effects of international cooperation to prevent piracy, it is recently on an increasing trend every year. Such circumstances may have a bad effect on the sound development of world economy by means of trade at sea as well as treat to the safety of crews and safe operation of ships. This paper aims to suggest the countermeasures against piracy in terms of criminal law, civil law and international law in order to secure safe operation of vessels at sea.

Adaptive Strategy Game Engine Using Non-monotonic Reasoning and Inductive Machine Learning (비단조 추론과 귀납적 기계학습 기반 적응형 전략 게임 엔진)

  • Kim, Je-Min;Park, Young-Tack
    • The KIPS Transactions:PartB
    • /
    • v.11B no.1
    • /
    • pp.83-90
    • /
    • 2004
  • Strategic games are missing special qualities of genre these days. Game engines neither reason about behaviors of computer objects nor have learning ability that can prepare countermeasure in variously command user's strategy. This paper suggests a strategic game engine that applies non-monotonic reasoning and inductive machine learning. The engine emphasizes three components -“user behavior monitor”to abstract user's objects behavior,“learning engine”to learn user's strategy,“behavior display handler”to reflect abstracted behavior of computer objects on game. Especially, this paper proposes two layered-structure to apply non-monotonic reasoning and inductive learning to make behaviors of computer objects that learns strategy behaviors of user objects exactly, and corresponds in user's objects. The engine decides actions and strategies of computer objects with created information through inductive learning. Main contribution of this paper is that computer objects command excellent strategies and reveal differentiation with behavior of existing computer objects to apply non-monotonic reasoning and inductive machine learning.

분석 사례를 통해 본 네트워크 포렌식의 동향과 기술

  • Kim, Hyuk-Joon;Lee, Sang-Jin
    • Review of KIISC
    • /
    • v.18 no.1
    • /
    • pp.41-48
    • /
    • 2008
  • 최근 인터넷의 가용성을 위협하는 대형 침해사고는 줄어들고 있으나 스팸, 피싱, 금전적 이익을 위한 분산서비스거부공격 등 악성행위의 양상은 더욱 정교하고 교묘해지고 있다. 이러한 변화는 인터넷 이용에 수반되는 잠재적인 위협을 크게 증가시켰으며 악성행위자와 이에 대응하는 보안전문가 간의 비대칭성을 크게 증가시키고 있다. 네트워크 포렌식은 보호하고자 하는 자산에 대한 직접적인 위협과 잠재 위협을 정확히 산정 할 수 있는 수단을 제공하여 기존의 대응 방법에서 발생하는 비대칭성을 상쇄시킬 수 있는 수단을 제공해준다. 본 논문에서는 네트워크 포렌식의 동향과 기술에 대해 설명하고 이를 이용한 분석 사례를 통해 네트워크 포렌식의 효용을 설명하였다.

A Contrastive Study on Korean and Chinese Passive Expression: Centered on Korean Act Subject Marks and Chinese Passive Marks (한·중 피동 표현 대조 연구 - 한국어 행위주 표지와 중국어 피동 표지 대비 중심으로 -)

  • Yu, Tong-Tong;Kim, In-Kyun
    • Cross-Cultural Studies
    • /
    • v.47
    • /
    • pp.217-240
    • /
    • 2017
  • This paper is based on a comparative analysis of the Korean act subject marks '-에게(한테), -로, -에' and Chinese passive marks '被[$b{\grave{e}}i$]/?[$r{\grave{a}}ng$]/叫[$ji{\grave{a}}o$]/?[$g{\check{e}}i$]'. Each distribution's aspects and characteristics were examined and corresponding relationships were analyzed by comparison of these forms. The method of this comparative analysis focused on three aspects such as tangible characteristics of the two languages, selective restrictions on the 'act subject' or 'passive subject' in the passive expression, and constraints on the use of the act subject (passive) marks in the Korean passive expression by '받다'. In this comparative analysis Korean act subject markers '-에게(한테), -로, -에' and Chinese passive markers '被/?/叫/?' are always as an adverb in passive expression in combination with the act subject. Despite this common point, some differences were revealed relative to the use of the two languages. First, we reveal that the 'act subject' and the conjoined manner follow the passive expression according to characteristics of the two languages. In addition, the act subject marks of Korean passive expressions '에게/한테, -에/로' only serve as an investigative role. They are limited only to [${\pm}animate$] of the act subject. But Chinese passive markers '被/?/叫/?' are often restricted by [${\pm}animate$] of passive subject, existence and non-existence of act subject. In the Korean passive expression by '받다', it is used as act subject marks '에게/한테, -에/로' but the Chinese passive marks are restricted by the meaning of lexical items in a sentence.

은닉형 악성코드를 활용한 공격 사례 분석과 대응방안에 대한 고찰

  • Ji, Seon-Hak;Park, Ji-Yun;Lee, Jae-Woo
    • Review of KIISC
    • /
    • v.26 no.1
    • /
    • pp.92-98
    • /
    • 2016
  • IT기술이 발달함에 따라서 데이터는 대량화, 다양화 되었다. 그에 따라서 이를 침해하려는 다양한 공격기술들이 등장하고 있다. 특히, 지능형 타깃 지속 공격이라는 APT(Advanced Persistent Threat) 공격은 날로 발전하고 있다. APT공격 중에서도 특히 은닉형 악성코드를 이용한 공격들이 많이 등장하고 있다. 은닉형 악성코드는 사용자가 인식하지 못하도록 보안시스템을 우회하고, 중요 데이터의 수집 및 유출을 위하여 교묘하게 시스템에 숨어들어 악의적인 행위를 하는 형태의 악성코드를 말한다. 이러한 고도화된 악의적인 행위를 하는 악성코드를 탐지하고, 대응하기 위한 기술들은 아직까지 부족한 것이 현실이다. 본 논문에서 대표적인 은닉형 악성코드와 공격사례를 분석하여 이를 대응할 수 있는 방안을 고찰해본다. 또한 이를 통하여 고도화된 공격기술들에 대해 예방하고 대응하는 자료로 활용 가능하다.

Adaptive Evolution of Behavioral Memory Circuits in Evolution of Artificial Individuals (인공개체 진화에서 행위기억회로의 적응적 진화)

  • Jung, Bo-Sun;Jung, Sung Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.67-75
    • /
    • 2016
  • This paper investigates how artificial individuals with behavioral memory circuits adaptively evolve with respect to given environments on a cell-level simulation framework simulating artificial individuals. This makes it possible for us to analyse the advantages of artificial individuals with behavioral memory circuits against the simple artificial individuals that can do only simple reactions with respect to the environments and to know which advanced reactions are possible. In order to do this analysis, we experimented various tests on a specific prey pattern and examined the results. As a first experiment, we tested that artificial individuals with four memory steps competed against from those without memory step to those with three memory steps. Experimental results showed that the artificial individuals with four memory steps were superior to most others. However, artificial individuals with two memory steps were better than those with four memory steps. This was caused that the artificial individuals with two memory steps could evolve faster than those of four memory steps. In a second experiment that all types of artificial individuals are simultaneously evolved, the artificial individuals with two memory steps also showed the best result in the experiment. We could conclude that the artificial individuals with memory was better than those without memory and the best memory steps of artificial individuals were depended on the complexity of prey patterns.

An Investigation of a Role of Affective factors in Users' Coping with Privacy Risk from Location-based Services (위치기반 서비스(Location-based Service)의 프라이버시 위험 대응에 있어 사용자 감정(Affect)의 역할)

  • Park, Jonghwa;Jung, Yoonhyuk
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.201-213
    • /
    • 2020
  • Despite empirical research that the response to human risk is significantly influenced affective factors, the role of affective factors has been unexplored in information privacy research. This study aims to explore the privacy behaviors of location-based service (LBS) users from an affective point of view. Specifically, the study explored the relationship between three types of privacy threats (collection, hacking, secondary use), two affects (worry, anger), and a coping behavior (continuous use intentions). The structured survey was conducted with 552 users. In order to analyze the effect of the combination of perception of particular privacy threats and particular affects on the intention of continuous use, association rules, one of the data mining techniques, was employed. As a result, there was a difference in the intention to use according to the combination of the perception of risk and affect responses, and the most significant influence on the intention is when the second use of personal information was combined with anger. This study has significant theoretical contribution in that it includes affective factors in the research of information privacy users, complementing the biases of existing cognition-oriented approaches and providing a comprehensive understanding of privacy response behavior.

행정지도에 대한 사례와 경쟁당국의 대응

  • 강대형
    • Journal of Korea Fair Competition Federation
    • /
    • no.88
    • /
    • pp.20-25
    • /
    • 2002
  • 행정지도에 대한 공정위의 기본입장은 먼저 행정지도의 근거가 법령에 명문화되어 있고 실제 행정지도의 목적, 수단, 내용 및 방법 등이 당해 법령의 규정에 합치되는 경우에는 이에 따른 사업자 또는 사업자 단체의 행위는 공정거래법 제58조에서 규정한 법령에 따른 정당한 행위에 해당되므로 원칙적으로 공정거래법상 문제되지 않는다고 할 것이다. 그러나 행정지도가 개별 법령에 근거 없이 이루어진 경우 이에 따른 사업자 또는 사업자단체의 행위가 부당공동행위로 인정될 때에는 원칙적으로 공정거래법에 위반된다고 할 것이다.

  • PDF

이상행위 탐지시스템 기술의 발전 방향

  • Im, Hyeong-Jin
    • Information and Communications Magazine
    • /
    • v.34 no.3
    • /
    • pp.37-46
    • /
    • 2017
  • 최근 핀테크 산업이 이슈가 되면서 금융 업무를 더 효율적으로 만드는 기술 중 하나로서 이상행위 탐지시스템(FDS)이 관심을 받고 있다. 이상행위 탐지시스템은 금융업무의 리스크 관리를 위한 기술로 주로 활용되고 있다. 본고에서는 이상행위 탐지시스템의 개념을 소개하고, 은행, 카드, 보험 등 금융권 적용분야를 살펴보고자 한다. 또한, 각 금융업무의 리스크 관리 목적뿐만 아니라 FDS를 활용한 침해사고 대응 활동을 소개하면서 기술 발전 방향을 고찰하도록 한다.