• Title/Summary/Keyword: 비밀유지

Search Result 135, Processing Time 0.026 seconds

Phenomenological Study about Bodyguards' Ethical Dilemmas (신변보호요원의 윤리적 딜레마에 대한 현상학적 연구)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.31-62
    • /
    • 2016
  • This study is about the phenomenological study of bodyguards' ethical dilemmas. Through this study, the meaning and essence of bodyguards' ethical dilemmas will be analyzed based on empirical facts. The purpose of this study is to provide basic information of the prevention and solutions for their ethical dilemmas and to understand and research the process and the essentials of them. To achieve this goal of the study, seven bodyguards who experienced ethical dilemmas working more than five years are selected as objects of the study. Colaizzi's six stage method are applied into this study so information gathered through interviews and questionnaire from 0ctober 1st, 2015 to November 20th, 2015 is analyzed. From the process of this research, these following conclusions are drawn considering validity of this study and ethical things. As a result, bodyguards' ethical dilemmas are divided into six centric meanings and 20 thematic statement. First, the centric meaning is conflict factors and the themes are discordance of pre-practice, regulatory or procedure problems, communication about sturcture and job and service disagreement. Second, the centric meaning is limited professional roles and the themes are institutional custom, decision making, priorities. Third, the centric meaning is difficulties of circumstantial judgement at work places and the themes are ambiguity of decision, conflict of knowledge, experience and opinion. Forth, the centric meaning is reasonable self-defense and the themes are lack of responsibility, rationalization, intentional negligence and sense of shame. Fifth, the centric meaning is difficulties of social network and the themes are the relationships between subordinates and superiors, the role of a moderator, uncooperative work and unpleasant sayings and doings. Sixth, the centric meaning is keeping secrets and the themes are burried for and illegal practice.

  • PDF

A Study on the Delivery Pattern of Korean letters during 1900-1945 (한국 우편 전달의 정착 양상 고찰)

  • Jeon, Byeong Yong
    • (The)Study of the Eastern Classic
    • /
    • no.73
    • /
    • pp.415-444
    • /
    • 2018
  • This study was designed to analyze the delivery patterns of early(1900-1945) letters from the beginning of the postal service in order to examine the process of establishing the modern postal system after the constitution of the Postal Service(1884). In Chapter 2, we examined the 'change of the way letters are delivered', Chapter 3 is about the 'change of expression' and Chapter 4 is about 'double-faced of the post'. In the examination of aspects of changing the way letters were delivered, the phase of postal delivery by personal delivery to postal delivery were divided into three phases: [the period of personal delivery delivery] > [the coexistence period of personal delivery and postal deliveryy] > [the period of postal delivery]. In particular, it was interesting to see that the same sender and receiver mixed up postal delivery and personal delivery by the case in the second period. In addition, the functional differences between the express, telegram and particular post were found in the examination fo contents of the letter. In the examination of aspects of changing in expression, a change of common expression in 'greeting, ending, and receiving expressions' were confirmed. Also, it was confirmed that 'woo-pyeon' was not used as the basic term, but instead replaced with various terms, and that 'woo' was used independently and productively. In the double-faced aspects of post, there were disadvantages of the postal delivery such as 'discontent of the lost' and 'security of confidentiality', despite the advantages of 'economic, rapid, and long-distance delivery'. Because the disadvantage of postal delivery could be supplemented by personal delivery, postal delivery and personal delivery could coexist for a considerable period of time.

A Study on the Bank's Breach of Contract to keep the Business Secrecy in Transferable Credit Transactions - with a Special Emphasis on the English Case Law, Jackson v. Royal Bank of Scotland - (양도가능신용장거래에서 은행의 영업상 비밀 유지의무위반에 관한 연구 - Jackson v. Royal Bank of Scotland 사건에 대한 영국법원의 판결을 중심으로)

  • Hahn, Jae-Phil
    • Journal of Arbitration Studies
    • /
    • v.16 no.1
    • /
    • pp.277-314
    • /
    • 2006
  • This article aims at analysing the reality of banks' liability resulting from the breach of contract on its part to keep the business secrecy with the supplier in the transferable credit, focusing on a English decision, Jackson v. Royal Bank of Scotland [2005] UKHL 3. In this case, the applicant, 'Econ', had purchased various varieties of pre-packed dog chews in bulk through 'Sam'(lst beneficiary) from 'PPLtd'(2nd beneficiary) in Thailand, using a transferable letter of credit issued by 'RBank'. 'Sam' charged a tremendous amount of mark-up on each transaction and it had not been disclosed to 'Econ', although the identity of 'PPLtd' was revealed to 'Econ' by various documents. However, 'RBank' made an unfortunate error to send an completion statement and other documents including 'PPLtd.'s invoice to 'Econ' instead of to 'Sam'. The effect of the Bank's error was to reveal to 'Econ' the substantial profit that 'Sam' was making on these transactions. CEO of 'Econ' was furious and, as a result, decided to cut 'Sam' out of its importing system and terminated their relationship. 'Sam' sued 'RBank' for damages to recover the loss of profits which could have been possibly made, if the information on the mark-up would not have been exposed to 'Econ'. The House of Lord held that 'RBank' was in breach of its duty of confidence, so 'Sam' was entitled to recover damages on a decreasing scale over 4 years, since there was no specific undertaking from the letter of credit.

  • PDF

Ransomware Prevention and Steganography Security Enhancement Technology Using Format Preserving Encryption (형태보존암호화를 이용한 랜섬웨어 방지 및 스테가노그래피 보안강화기술)

  • Lim, Ji-hwan;Na, Gwan-Woo;Woo, Jae-Min;Seo, Hwa-joeng
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.805-811
    • /
    • 2018
  • Recently, Format-Preserving-Encryption (FEA) was suggested by the National Security Research institute (NSR) as an encryption method while maintaining the format without a distortion to the intended information to be encrypted. In this paper, we propose a scheme to solve conventional cyber security problems by using FEA scheme. First, we present the method to encrypt signatures and extensions with FEA in order to effectively defend against Ransomeware attacks. This technique can mitigate the exposure to the Ransomeware by encrypting the minimum information. Second, in order to reduce the secret information for Steganography, we introduce a new way to minimize the secret information with FEA. Finally, we compare the operation speed by encryption with FEA and Lightweight Encryption Algorithm (LEA), furthermore when we optimize FEA we want to compare with the performance improvement accompanying with it.

Research on Influencing Factors on Conflicts between Client and Designer in CI Development and Conflict Resolution Strategies (CI개발에 있어 의뢰인과 디자이너간 갈등의 영향요인과 해소방안연구)

  • Jung, Hyung-Shik;Choi, Mi-Soon;Kim, Young-Shim
    • Archives of design research
    • /
    • v.18 no.1 s.59
    • /
    • pp.185-194
    • /
    • 2005
  • The objectives of this research are to examine the relationships among designers' characteristics, mutual communication, conflicts between CI designer and client, to test the impacts of conflicts and four type of resolution strategies on the performance of CI development, and to recommend proper strategies for successful CI process and output management. The survey results show as follows. First, CI designers' confidentiality on clients' internal information and creative designing ability were found to affect mutual communication between them. Second, proper communication was found to lessen the conflict level which in turn yielded the positive performance of CI development, especially for the clients' side. Third, it is suggested that the conflict level be first reduced and conflict resolution strategies be applied depending upon the conflict level and related party of designer or client position, respectively.

  • PDF

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.

Implementation of an Automatic Door Lock System Using DTMF Signal of a Mobile Phone (모바일 단말기의 DTMF 신호를 이용한 자동 도어락 시스템 구현)

  • Bae Ki-Won;Yang Doo-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.8-13
    • /
    • 2006
  • In this thesis, an automatic door lock system using a dual tone multiple frequency(DTMF) signal generated as pushing the key button of mobile phone is proposed and implemented. This system consists of a transmitter module and a receiver module for processing the DTMF signal of mobile phone. The DTMF signal of mobile phone connected with ear-phone jack enter into the input terminal of DTMF receiver and those are encoded by a code-converter with 4-bits binary format in the DTMF receiver. The encoded output signals are transmitted to the amplitude shift keying(ASK) modulator of transmitter module and the modulated ASK signals which are converted into radio frequency(RF) signals propagate in a free space. The RF signals passed through a free space are demodulated by the ASK demodulator of receiver module and the demodulated ASK signals are sent to a micro-controller unit(MCU). The output signals processed by the MCU are compared with the secreted identification number which is prerecorded in a microprocessor and are transferred to a power relay. If the result is the same, the automatic door lock system opens a door. In the opposite case, it maintains closing the door. The implemented automatic door lock system operates well in mobile environments.

  • PDF

Study for Balanced Encoding Method against Side Channel Analysis (부채널 분석에 안전한 밸런스 인코딩 기법에 관한 연구)

  • Yoon, JinYeong;Kim, HanBit;Kim, HeeSeok;Hong, SeokHie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1443-1454
    • /
    • 2016
  • Balanced encoding method that implement Dual-rail logic style based on hardware technique to software is efficient countermeasure against side-channel analysis without additional memory. Since balanced encoding keep Hamming weight and/or Hamming distance of intermediate values constantly, using this method can be effective as countermeasure against side channel analysis due to elimination of intermediate values having HW and/or HD relating to secret key. However, former studies were presented for Constant XOR operation, which can only be applied to crypto algorithm that can be constructed XOR operation, such as PRINCE. Therefore, our first proposal of new Constant ADD, Shift operations can be applied to various symmetric crypto algorithms based on ARX. Moreover, we did not used look-up table to obtain efficiency in memory usage. Also, we confirmed security of proposed Constant operations with Mutual Information Analysis.

The Design of Military Security Audit based on the M-ISMS Model (M-ISMS 모델 기반의 군(軍) 보안감사 설계에 관한 연구)

  • Kim, Dae Gyu;Cho, Hee Joon;Kim, Chang Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.761-769
    • /
    • 2014
  • We propose an improved M-ISMS(Military-ISMS) model which is based on common ISMS model for regarding military's unique characteristics. Our model focuses on 'Internal Security Audit' and 'Management of external activity' as military circumstances. So, we added the six control new items as internal security audits. Because the confidentiality is more important than availability in military service as compared with private sectors. In addition, we propose some control suggestions for establishing security management standards and keeping level maintenance when it will becomes to lose a value as confidential. The M-ISMS model in this paper has effectiveness which prevents security incidents in advance rapidly throughout a variety of common ISMS's advantages and security incidents of private sectors in consideration of military characteristics.