• Title/Summary/Keyword: 보안 법률

Search Result 158, Processing Time 0.025 seconds

Analysis of Autonomous Driving Vehicle and Korea's Competitiveness Strategy (자율주행차 현황분석과 한국의 경쟁력 확보 전략)

  • Yang, Eun-ji;Kang, Su-jin;Kwon, So-ei;Kim, Da-yeon;Kim, Ji-won;Lee, Yu-jeong;Hwang, Hye-jeong;Chang, Young-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.49-54
    • /
    • 2017
  • In Korea, partial self-driving feature is added on Genesis G80, Tivoli 2017, and others, and full implementation is under evaluation. Tesla already completed test for full self-driving car, Tesla Model 'X'. Further adoption of self-driving car in market will bring benefits to the elderly and disabled, meanwhile traffic accident will be decreased. However, related regulations for traffic accident with autonomous car including ethical responsibility is not fully established yet. In addition, security and privacy issue of self-driving cars should be improved as well. In this paper, domestic researches and analysis status on autonomous car will be summarized, and proper activation model will be proposed for the previously described issues.

Study on Policies for National Cybersecurity (국가 사이버안보를 위한 정책 연구)

  • Ham, Seung-hyeon;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1666-1673
    • /
    • 2017
  • Republic of Korea is divided into South Korea and North Korea, creating military conflicts and social conflicts. North Korea is conducting cyberattacks against South Korea and has hacked South Korea's defense network. In the world of cyberspace, the boundaries of the borders are becoming obscured, and cyberattacks and cyberterrorism for cyberwarfare operate with digital computing connected to points, time and space. Agenda and manual are needed for national cybersecurity. Also, it is necessary to study national cybersecurity laws and policies that can create and implement nationalcyber security policy. This paper investigates cyberterrorism situation in North and South Korean confrontation situation and damage to cyberwarfare in the world. We also study cybersecurity activities and cyberwarfare response agendas, manuals and new technologies at home and abroad. And propose national cybersecurity policy and propose policies so that '(tentative) The National Cybersecurity Law' is established. This study will be used as basic data of national cybersecurity law and policy.

An Study on Privacy Policy Research Trend: Focused on KCI Published (개인정보보호정책에 관한 연구동향 고찰: KCI등재지를 중심으로)

  • Bok, Jun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.81-89
    • /
    • 2020
  • Since the Korean privacy policy was legalized in 2011, the related academical researches have been lasted in various fields. Upcoming so-called 3 data laws would be implemented, it is meaningful to review privacy policy studies for exploring future research direction. For this purpose, the total of 146 journals from 2011 to 2019 were reviewed by the content analysis following as research subjects, methodologies and constructions of studies. As results, the numbers of the researches have been conducted on protection policies themselves for improvement, comparing with other countries' policies and also digital finance information protection were deeply discussed. Some of technology based protection applications were experimented and suggested. The major research characteristics was mainly focused on case analysis and criminal laws and policies were developed as protection contingencies. However, most research objects were focused on the protection regulations, not deregulation, therefore, researchers in future study need to explore more digital industry-centric tasks which are practically applied in safer ways. Further, social agreement in using private information will be an essential to prevent indiscriminate use.

Comparison of The ISMS Difference for Private and Public Sector (민간기업과 공공기관의 정보보호 관리체계 차이 비교)

  • Kim, Ji-Sook;Lee, Soo-Yeun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.117-129
    • /
    • 2010
  • To support the establishment of Information Security Management System, the private sector and the public sector have taken some measures. In the private sector, KISA(Korea Internet & Security Agency) has certified ISMS system based on "The Act on Communication Network Use Promotion and Information Security etc.". In the public sector, No authentication system has been established. Instead, NIS(National Intelligence Service) has enforced 'Information Security Management Condition Evaluation' based on "Electronic Government Act". This article compared ISMS control parts of the private sector with that of the public sector and analyzed the non-enforcement parts of ISMS implementing two sectors for years. Based on this, I would like to consider the method of establishment for efficient ISMS.

Analysis of k Value from k-anonymity Model Based on Re-identification Time (재식별 시간에 기반한 k-익명성 프라이버시 모델에서의 k값에 대한 연구)

  • Kim, Chaewoon;Oh, Junhyoung;Lee, Kyungho
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.43-52
    • /
    • 2020
  • With the development of data technology, storing and sharing of data has increased, resulting in privacy invasion. Although de-identification technology has been introduced to solve this problem, it has been proved many times that identifying individuals using de-identified data is possible. Even if it cannot be completely safe, sufficient de-identification is necessary. But current laws and regulations do not quantitatively specify the degree of how much de-identification should be performed. In this paper, we propose an appropriate de-identification criterion considering the time required for re-identification. We focused on the case of using the k-anonymity model among various privacy models. We analyzed the time taken to re-identify data according to the change in the k value. We used a re-identification method based on linkability. As a result of the analysis, we determined which k value is appropriate. If the generalized model can be developed by results of this paper, the model can be used to define the appropriate level of de-identification in various laws and regulations.

Comparative Study of Security Services Industry Act and Police Assigned to Special Guard Act - Focused on special guards and police assigned to special guard duty - (경비업법과 청원경찰법의 비교 연구 특수경비원과 청원경찰을 중심으로)

  • Noh, Jin-keo;Lee, Young-ho;Choi, Kyung-cheol
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.177-203
    • /
    • 2018
  • Police Assigned to Special Guard Act was legislated in 1962 to solve issues regarding the protection of various staple industrial installations, and in 2001, the Security Services Industry Act was revised to establish an effective security system for important national facilities. Thereby the Special Guards System was instituted. The current law has two parts, with the Police Assigned to Special Guard System and Special Guards System, and many scholars have actively discussed the appropriateness of the integration of both systems to solve problems caused by a bimodal system. However, in spite of these discussions taking place in the academic world, the idea of unification lost its power when the guarantee of status regulation was established for the police assigned to special guard. Strictly speaking, police assigned to special guard is a self-guard, and a special guard is a contractual guard. So, both of them have pros and cons. Thus, it would be desirable to give a legal, constitutional guarantee for both systems by strengthening each of them and making up for the weakness of each of them rather than trying to unify police assigned to special guard and special guard. To begin this process, we need to revise unreasonable legal provisions of Security Services Industry Act and Police Assigned to Special Guard Act as below. First, since the actual responsibilities of special guards and police assigned to special guard duty are the same, we need to make the facilities which they use equal. Second, legal provisions need to be revised so that a special guard may perform the duties of a police officer, according to the Act on the Performance of Duties by Police Officers, within the facility that needs to be secured in order to prevent any vacancy in the guarding of an important national facility. Third, disqualifications for the special guards need to be revised to be the same as the disqualifications for the police assigned to special guard duty. Fourth, it is reasonable to unify the training institution for special guards and for police assigned to special guard duty, and it should be the training institution for police. On-the-job education for a security guard needs to be altered to more than 4 hours every month just like the one for police assigned to special guard duty. Fifth, for a special guard, it is not right to limit the conditions in their using weapons to 'use of weapon or explosives' only. If one possesses 'dangerous objects such as weapon, deadly weapon, and so on' and resists, a special guard should be able to use their weapon against that person. Thus, this legal provision should be revised. Sixth, penalty, range of fines, and so on for police assigned to special guard duty need to be revised to be the same as the ones for a special guard. If we revise these legal provisions, we can correct the unreasonable parts of Security Services Industry Act and Police Assigned to Special Guard Act without unifying them. Through these revisions, special guards and police assigned to special guard duty may develop the civilian guard industry wholesomely under the law, and the civilians would have a wider range of options to choose from to receive high quality security service.

A Study on the Preventive Measures of Criminal Behaviors and Criminal Damages of North Korean Defectors (북한이탈주민의 범죄행위 및 범죄피해에 대한 효과적인 예방대책)

  • Lim, Chang-Ho
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.217-246
    • /
    • 2016
  • Most of the North Korean defectors are the socially disadvantaged, and formed the lowest class in South Korean society. Their main objectives are to achieve economic wealth. In this process, North Korean defectors have often committed the crime or have been criminal victims. The purpose of this study was to propose the effective preventive measures after analyzing the actual situation of North Korean defectors in criminal behaviors and criminal damages. This research has studied of the literature on the criminal behavior and the criminal damage by North Korean defectors, utilized the relevant statistical data, cited the news for the relevant cases, and proposed the effective preventive measures of criminal behaviors and criminal damages of North Korean defectors by doing in-depth interviews with personal protection officer First, in order to prevent criminal activity by North Korean defectors, we should uplift the identity as the members of Korean society, systemize the initial adapt education, enlarge the employment protection and the resettlement helper system, manage North Korean defectors according to adaptive type, develop the network, establish the management department for the defectors, strengthen the training of prison inmates, and strengthen the management of unprotected people. Next, in order to prevent the criminal damages of North Korean refugees, we should manage vulnerable North Korean defectors effectively, maintain the liaison between the personal protection officer and North Korean defector, arrange the personal safety measures in advance when traveling abroad, enhance the legal education for usual living in Korean society, and perform the re-education for the female socialization.

  • PDF

A Study on the Development of Souvenirs as Local Cultural Tourism Products - Focused on developing souvenir design - (지역 문화관광상품으로서의 기념품 개발 연구 - 기념품 디자인 개발 중심으로 -)

  • Hwang, Gyun-Jeong
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.73-79
    • /
    • 2020
  • With the recent strengthening of local autonomy and the recognition of the culture and tourism industry as a driving force for the fourth industrial revolution, the importance of research on the revitalization of the local culture and tourism industry is further emphasized. Thus, in this paper, the concept and type of local culture and tourism products were summarized and the research direction was presented through this. As a research method, the internal and external factors of the culture and tourism industry in Korea were used as the SWOT analysis method. In the text, three representative sites were selected and analyzed for the development of local cultural and tourism products, and Seoul, Jeju Island, and Gyeongju all found that they lacked local cultural and tourism products. It also found another value through its role of cultural development as well as the economic aspect of the development of cultural tourism products. In order to revitalize the local culture and tourism industry, which has become more important, the government proposed measures to promote differentiated creative products, efficient marketing, and legal security in various ways. In order for this study to be better data for researchers in the culture and tourism industry and related industries, research should be conducted with detailed surveys that could not be conducted due to various restrictions in the future.

Emotional Labor and Human Rights Protection in the case of airlines (감정노동과 인권보호 - 항공사를 중심으로)

  • Shin, Dong Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.87-108
    • /
    • 2014
  • Recent examples of abuse by black consumers (including air travellers) against emotional laborers have become a serious social issue in Korea in that they are likely to violate human rights of those laborers. Emotional labor is a form of emotion regulation that creates a publicly visible facial and bodily display, and also emotional management within the workforce that creates a situation in which the emotion management by workers can be exchanged in the marketplace. Example professions that require emotional labor are: nurses, doctors, waiting staff, and television actors. However, as the economy moves from a manufacturing to a service-based economy, many more workers in a variety of occupational fields are expected to manage their emotions according to employer demands when compared to the past. One of symptoms deriving from emotional labor is smile mask syndrome abbreviated SMS, which is a psychological disorder proposed by professor Makoto Natsume where subjects develop depression and physical illness as a result of prolonged, unnatural smiling. And higher degree of using emotion regulation on the job is related to higher levels of employees' emotional exhaustion, and lower levels of employees' job satisfaction. In most part, emotional laborers are more abused and hurt by so called black consumers who are raising complaints relating to products and services purchased against service providers for the purpose of maliciously getting compensation. Against this background, the Korean Government abolished "the Consumer Protection Act" and instead promulgated "the Basic Consumer Act" in September 2006 which stipulates that consumers are expected to have protection as well as responsibility and duty. The Aviation Security Act cites the examples of prohibited behaviors (unruly passengers) while they are travelling. In addition, human rights of emotional laborers could be more protected by the enhancement of etiquettes and cavalry and improvement of culture and working environment.

A Study on the Liability of Information Protection for the Third Party Supply of Personal Information/Focus on Fintech Companies Using OPEN APIs (개인정보의 제3자 제공시 정보보호 관련 법상 책임에 관한 연구/OPEN API 이용 핀테크 기업을 중심으로)

  • Kim, Jo-eun;Kim, In-seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.21-38
    • /
    • 2017
  • It is actively opening the market to fintech companies through open platforms, such as financial institutions and public institutions. In this thesis, we will look at the conceptual differences between the "provision of third-party information" and "entrustment" of information protection related laws, such as the Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Data Protection Etc (Network Utilization Protection Act). In addition, the legal obligation to provide information regarding the legal rights of information is considered to be relevant, whereas the legal obligation of the private information provided by the company is excessively mitigated, whereas the legal obligation of the company to provide information is excessively mitigated. In addition, I suggest self-diagnosis checklist to help fintech companies improve their privacy levels. It was found that the level of information protection was relatively insufficient compared to the consignees based on the results of a survey conducted for 31 fintech companies. Aggressive use of the checklist is suggested to raise the level of information protection for those companies.